File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Rethinking Permission Enforcement Mechanism on Mobile Systems

TitleRethinking Permission Enforcement Mechanism on Mobile Systems
Authors
Keywordsapplication context
Permission enforcement
policy framework
Issue Date2016
Citation
IEEE Transactions on Information Forensics and Security, 2016, v. 11, n. 10, p. 2227-2240 How to Cite?
AbstractTo protect sensitive resources from unauthorized use, modern mobile systems, such as Android and iOS, design a permission-based access control model. However, current model could not enforce fine-grained control over the dynamic permission use contexts, causing two severe security problems. First, any code package in an application could use the granted permissions, inducing attackers to embed malicious payloads into benign apps. Second, the permissions granted to a benign application may be utilized by an attacker through vulnerable application interactions. Although ad hoc solutions have been proposed, none could systematically solve these two issues within a unified framework. This paper presents the first such framework to provide context-sensitive permission enforcement that regulates permission use policies according to system-wide application contexts, which cover both intra-application context and inter-application context. We build a prototype system on Android, named FineDroid, to track such context during the application execution. To flexibly regulate the context-sensitive permission rules, FineDroid features a policy framework that could express generic application contexts. We demonstrate the benefits of FineDroid by instantiating several security extensions based on the policy framework, for three potential users: end users, administrators, and developers. Furthermore, FineDroid is showed to introduce a minor overhead.
Persistent Identifierhttp://hdl.handle.net/10722/346593
ISSN
2023 Impact Factor: 6.3
2023 SCImago Journal Rankings: 2.890

 

DC FieldValueLanguage
dc.contributor.authorZhang, Yuan-
dc.contributor.authorYang, Min-
dc.contributor.authorGu, Guofei-
dc.contributor.authorChen, Hao-
dc.date.accessioned2024-09-17T04:11:55Z-
dc.date.available2024-09-17T04:11:55Z-
dc.date.issued2016-
dc.identifier.citationIEEE Transactions on Information Forensics and Security, 2016, v. 11, n. 10, p. 2227-2240-
dc.identifier.issn1556-6013-
dc.identifier.urihttp://hdl.handle.net/10722/346593-
dc.description.abstractTo protect sensitive resources from unauthorized use, modern mobile systems, such as Android and iOS, design a permission-based access control model. However, current model could not enforce fine-grained control over the dynamic permission use contexts, causing two severe security problems. First, any code package in an application could use the granted permissions, inducing attackers to embed malicious payloads into benign apps. Second, the permissions granted to a benign application may be utilized by an attacker through vulnerable application interactions. Although ad hoc solutions have been proposed, none could systematically solve these two issues within a unified framework. This paper presents the first such framework to provide context-sensitive permission enforcement that regulates permission use policies according to system-wide application contexts, which cover both intra-application context and inter-application context. We build a prototype system on Android, named FineDroid, to track such context during the application execution. To flexibly regulate the context-sensitive permission rules, FineDroid features a policy framework that could express generic application contexts. We demonstrate the benefits of FineDroid by instantiating several security extensions based on the policy framework, for three potential users: end users, administrators, and developers. Furthermore, FineDroid is showed to introduce a minor overhead.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Information Forensics and Security-
dc.subjectapplication context-
dc.subjectPermission enforcement-
dc.subjectpolicy framework-
dc.titleRethinking Permission Enforcement Mechanism on Mobile Systems-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TIFS.2016.2581304-
dc.identifier.scopuseid_2-s2.0-84979871490-
dc.identifier.volume11-
dc.identifier.issue10-
dc.identifier.spage2227-
dc.identifier.epage2240-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats