Rethinking Permission Enforcement Mechanism on Mobile System
Journal: International Journal of Engineering and Techniques (Vol.3, No. 1)Publication Date: 2017-01-01
Authors : Chitra.S Arunadevi.R;
Page : 33-37
Keywords : Sensitive resources; permission; framework; intra-application context; inter-application context; FineDroid.;
Abstract
To protect sensitive resources from unauthorized use, modern mobile systems, such a Android and iOS, design a permission-based access control model. However, current model could not enforce fine-grained control over the dynamic permission use contexts, causing two severe security problems. First, any code package in an application could use the granted permissions, inducing attackers to embed malicious payloads into benign apps. Second, the permissions granted to a benign application may be utilized by an attacker through vulnerable application interactions. Although ad hoc solutions have been proposed, none could systematically solve these two issues within a unified framework. The first such framework to provide context-sensitive permission enforcement that regular's permission use policies according to system-wide application contexts, which cover both intra-application context and inter-application context. We build a prototype system on Android , named FineDroid, to track such context during the applicaton execution. To flexibly regulate the context-sensitive permission rules, FineDroid features a policy framework that could express generic application contexts. We demonstrate the benefits of FineDroid by instantiating several security extensions based on the policy framework, for three potential users: end users, administrators and developers. Furthermore, FineDroid is showed to introduce a minor overhead.
Other Latest Articles
- Machine Learning for Real Estate Contracts – Automatic Categorization of Text
- Prototype Knowledge Management System with Quality Function Deployment Method: a Case Study at K Software House
- Multilevel Security for Data as a Service (Spacebox) Using Cryptography
- Enhancement and Performance Analysis of VoIP Algorithms in Wireless Networks
- Improvement of Fault Ride-through capability in DFIG wind turbine with Fuzzy controlled SFCL
Last modified: 2018-05-19 14:55:40