File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TIFS.2016.2581304
- Scopus: eid_2-s2.0-84979871490
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Rethinking Permission Enforcement Mechanism on Mobile Systems
Title | Rethinking Permission Enforcement Mechanism on Mobile Systems |
---|---|
Authors | |
Keywords | application context Permission enforcement policy framework |
Issue Date | 2016 |
Citation | IEEE Transactions on Information Forensics and Security, 2016, v. 11, n. 10, p. 2227-2240 How to Cite? |
Abstract | To protect sensitive resources from unauthorized use, modern mobile systems, such as Android and iOS, design a permission-based access control model. However, current model could not enforce fine-grained control over the dynamic permission use contexts, causing two severe security problems. First, any code package in an application could use the granted permissions, inducing attackers to embed malicious payloads into benign apps. Second, the permissions granted to a benign application may be utilized by an attacker through vulnerable application interactions. Although ad hoc solutions have been proposed, none could systematically solve these two issues within a unified framework. This paper presents the first such framework to provide context-sensitive permission enforcement that regulates permission use policies according to system-wide application contexts, which cover both intra-application context and inter-application context. We build a prototype system on Android, named FineDroid, to track such context during the application execution. To flexibly regulate the context-sensitive permission rules, FineDroid features a policy framework that could express generic application contexts. We demonstrate the benefits of FineDroid by instantiating several security extensions based on the policy framework, for three potential users: end users, administrators, and developers. Furthermore, FineDroid is showed to introduce a minor overhead. |
Persistent Identifier | http://hdl.handle.net/10722/346593 |
ISSN | 2023 Impact Factor: 6.3 2023 SCImago Journal Rankings: 2.890 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhang, Yuan | - |
dc.contributor.author | Yang, Min | - |
dc.contributor.author | Gu, Guofei | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:11:55Z | - |
dc.date.available | 2024-09-17T04:11:55Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | IEEE Transactions on Information Forensics and Security, 2016, v. 11, n. 10, p. 2227-2240 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346593 | - |
dc.description.abstract | To protect sensitive resources from unauthorized use, modern mobile systems, such as Android and iOS, design a permission-based access control model. However, current model could not enforce fine-grained control over the dynamic permission use contexts, causing two severe security problems. First, any code package in an application could use the granted permissions, inducing attackers to embed malicious payloads into benign apps. Second, the permissions granted to a benign application may be utilized by an attacker through vulnerable application interactions. Although ad hoc solutions have been proposed, none could systematically solve these two issues within a unified framework. This paper presents the first such framework to provide context-sensitive permission enforcement that regulates permission use policies according to system-wide application contexts, which cover both intra-application context and inter-application context. We build a prototype system on Android, named FineDroid, to track such context during the application execution. To flexibly regulate the context-sensitive permission rules, FineDroid features a policy framework that could express generic application contexts. We demonstrate the benefits of FineDroid by instantiating several security extensions based on the policy framework, for three potential users: end users, administrators, and developers. Furthermore, FineDroid is showed to introduce a minor overhead. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Information Forensics and Security | - |
dc.subject | application context | - |
dc.subject | Permission enforcement | - |
dc.subject | policy framework | - |
dc.title | Rethinking Permission Enforcement Mechanism on Mobile Systems | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TIFS.2016.2581304 | - |
dc.identifier.scopus | eid_2-s2.0-84979871490 | - |
dc.identifier.volume | 11 | - |
dc.identifier.issue | 10 | - |
dc.identifier.spage | 2227 | - |
dc.identifier.epage | 2240 | - |