Filters








39 Hits in 3.5 sec

Practical DIFC Enforcement on Android

Adwait Nadkarni, Benjamin Andow, William Enck, Somesh Jha
2016 USENIX Security Symposium  
Our DIFC system, Weir, is backwards compatible by design, and incurs less than 4 ms overhead for component startup. With Weir, we demonstrate practical and secure DIFC enforcement on Android.  ...  In this paper, we describe the challenges for decentralized information flow control (DIFC) enforcement on Android.  ...  Further, we describe how previous Android DIFC systems fare with respect to the challenges, and state the design goals for practical DIFC enforcement on Android. by default.  ... 
dblp:conf/uss/NadkarniAEJ16 fatcat:duua7m72jrf2xdadafh4gefpna

Clouds of Things Need Information Flow Control with Hardware Roots of Trust

Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon
2015 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)  
Towards this, we propose an approach based on Information Flow Control (IFC) that allows: (1) the continuous, end-to-end enforcement of data flow policy, and (2) the generation of provenance-like audit  ...  TPMs can be leveraged to validate software configurations, including the IFC enforcement mechanism, both in the cloud and externally via remote attestation.  ...  We enforce DIFC between machines through a specific messaging middleware (CamFlow-MW 1 ) operates on *nix based systems (iOS, Linux, Android etc.), and thus can operate to manage the interactions between  ... 
doi:10.1109/cloudcom.2015.41 dblp:conf/cloudcom/PasquierSB15 fatcat:tna3qe4grbdyjkh4jwzggnoqda

Preventing accidental data disclosure in modern operating systems

Adwait Nadkarni, William Enck
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
Modern OSes such as Android, iOS, and Windows 8 have changed the way consumers interact with computing devices.  ...  Therefore OS providers cannot practically define security policy. Instead, Aquifer uses the multiple-owner policy semantics of decentralized information flow control (DIFC) [27] .  ...  DIFC allows applications to define their own label types. Aquifer's policy is based on DIFC semantics, but it is optimized for the specific needs of the data intermediary problem.  ... 
doi:10.1145/2508859.2516677 dblp:conf/ccs/NadkarniE13 fatcat:pryzgt6nrvbw3bwbahs7a2c6ja

Middleware-based Security for Hyperconnected Applications in Future In-Car Networks

Alexandre Bouard, Dennis Burgkhardt, Claudia Eckert
2013 EAI Endorsed Transactions on Mobile Communications and Applications  
The transition toward Ethernet/IP-based on-board communication could be a first step to respond to these security and privacy issues.  ...  For tomorrow, the use of Ethernet/IP as on-board communication standard has been strongly investigated EAI European Alliance for Innovation 2 ICST  ...  CE device and TPA cannot be trusted to enforce DIFC rules, that's why their middleware is DIFC unaware and we rely on the HU service and proxy to enforce security.  ... 
doi:10.4108/mca.1.3.e7 fatcat:3ap33miyb5bkvhmx5rsp5pm2te

Reducing Security Risks of Suspicious Data and Codes through a Novel Dynamic Defense Model

Zezhi Wu, Xingyuan Chen, Zhi Yang, Xuehui Du
2019 IEEE Transactions on Information Forensics and Security  
We also practically implemented a prototype system named DDDroid on Android.  ...  Index Terms-Dynamic defense model, dynamic taint tracking, information flow control, behavior-based malware analysis, android.  ...  [13] proposed a DIFC-style enforcement system that permits applications to specify security policy via labels applied to the components on Android.  ... 
doi:10.1109/tifs.2019.2901798 fatcat:vrsm6s7mxbh4zh5y3ovj3xeyiq

A Simple Face-based Mobile Security System Design for Android Phone Protection

Alabi A., Ogundoyin I.
2017 International Journal of Computer Applications  
The code was written in JAVA on a platform called "Android Visual Studio" and the required tools and Texts were built with the aid of the Android In-built Controls; which generate their own codes when  ...  The design was made in such a way that security info was sent to a designated Email for necessary action whenever an illegal attempt is noticed on the mobile phone.  ...  This brought about a practical and secure DIFC enforcement on Android. However, mobile phone users can potentially have their geographical location and movements traced at any time or all the time.  ... 
doi:10.5120/ijca2017913233 fatcat:do3vhrjnyvexvo2r64snoybwpi

DroidDisintegrator

Eran Tromer, Roei Schuster
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
We evaluate DroidDisintegrator on dozens of apps. * A short version of this paper is  ...  DroidDisintegrator uses dynamic analysis to generate IFC policies for Android apps, repackages apps to embed these policies, and enforces the policies at runtime.  ...  DIFC.  ... 
doi:10.1145/2897845.2897888 dblp:conf/ccs/TromerS16 fatcat:6u5ypffusbdvrejrvuxzimxxsi

Information flow based defensive chain for data leakage detection and prevention: a survey [article]

Ning Xi, Chao Chen, Jun Zhang, Cong Sun, Shigang Liu, Pengbin Feng, Jianfeng Ma
2021 arXiv   pre-print
With a focus on lifecycle protection, this survey reviews the recent representative works adopted in different phases.  ...  Context-sensitive DIFC enforcement on Android. Decentralized IFC (DIFC) [96] [98] [150] is required for Android apps to specify control policy on their own data.  ...  Therefore, Adwait et al. [97] proposed a context-sensitive DIFC enforcement for Android applications via lazy polyinstantiation.  ... 
arXiv:2106.04951v1 fatcat:apib4mmp3va43dv5he7xu3aay4

Run-Time Enforcement of Information-Flow Properties on Android [chapter]

Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake
2013 Lecture Notes in Computer Science  
We tested our prototype on a Nexus S phone, verifying that it can enforce practically useful policies that can be implemented with minimal modification to off-the-shelf applications.  ...  Our design fits the Android programming model cleanly enough that we have developed a fully functional prototype on Android 4.0.4.  ...  [19] presented one of the first proofs of noninterference for practical DIFC-based operating systems. Our design is inspired by Flume [20] , but has many differences.  ... 
doi:10.1007/978-3-642-40203-6_43 fatcat:eo42uz4nybcxtbfyzrkqpkg45a

EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs

Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli-Reineh, Patrick D. McDaniel, Jens Grossklags, Trent Jaeger
2019 USENIX Security Symposium  
To demonstrate this approach, we implement the EnTrust authorization system for Android OS.  ...  Researchers have previously explored methods to restrict access to device sensors based on the state of the user interface that elicited the user input or based on the set of cooperating programs, but  ...  The research work of Jens Grossklags was supported by the German Institute for Trust and Safety on the Internet (DIVSI).  ... 
dblp:conf/uss/PetraccaSAMGJ19 fatcat:tg4tflo2nnas7mbukbhdplodk4

A Study of Security Isolation Techniques

Rui Shu, Peipei Wang, Sigmund A Gorski III, Benjamin Andow, Adwait Nadkarni, Luke Deshotels, Jason Gionta, William Enck, Xiaohui Gu
2016 ACM Computing Surveys  
We break the mechanism into two dimensions: enforcement location and isolation granularity, and break the policy aspect down into three dimensions: policy generation, policy configurability, and policy  ...  Aurasium repackages arbitrary Android applications by inserting instrumentation code into applications to attach sandboxing and policy enforcement code.  ...  [Harris et al. 2009 ] use model checking to verify an application's secrecy goals and its Flume ] DIFC policy, but cannot model all DIFC properties.  ... 
doi:10.1145/2988545 fatcat:5llqb3ghnjgghh2yye4vqslz4y

Dynamic mandatory access control for multiple stakeholders

Vikhyath Rao, Trent Jaeger
2009 Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09  
In this thesis, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information.  ...  In the emerging open cell phone system environment, many devices run software whose access permissions depends on multiple stakeholders, such as the device owner, the service provider, the application  ...  In our solution we create a practical and scalable framework by using our CRM to enforce policy and identify permission requests dynamically.  ... 
doi:10.1145/1542207.1542217 dblp:conf/sacmat/RaoJ09 fatcat:2dbpvmyxvjfnrfssxfg7xbqelq

Permission Re-Delegation: Attacks and Defenses

Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin
2011 USENIX Security Symposium  
We discuss permission re-delegation and demonstrate its risk by launching real-world attacks on Android system applications; several of the vulnerabilities have been confirmed as bugs.  ...  We have implemented IPC Inspection for a browser and Android, and we show that it prevents the attacks we found in the Android system applications.  ...  DIFC.  ... 
dblp:conf/uss/FeltWMHC11 fatcat:gwiwrd5zufb3xicthe5difn5mu

A portable user-level approach for system-wide integrity protection

Wai-Kit Sze, R. Sekar
2013 Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13  
Like sandboxing, all user data is held within one name space, thereby providing a unified view.  ...  To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org.  ...  Automating policy development To build a practical system that preserves user experience, we need as much (if not more) emphasis on the policies as on the enforcement mechanisms.  ... 
doi:10.1145/2523649.2523655 dblp:conf/acsac/SzeS13 fatcat:vcv5jeqwhzbsndtcvrfl6wzf3q

Quire: Lightweight Provenance for Smart Phone Operating Systems [article]

Michael Dietz and Shashi Shekhar and Yuliy Pisetsky and Anhei Shu and Dan S. Wallach
2011 arXiv   pre-print
In Quire, we engineered two new security mechanisms into Android to address these issues.  ...  Even within the phone, different apps with different privileges can communicate with one another, allowing one app to trick another into improperly exercising its privileges (a Confused Deputy attack).  ...  The Kirin system [10] and Security-by-Contract [8] focus on enforcing install time application permissions within the Android OS and .NET framework respectively.  ... 
arXiv:1102.2445v1 fatcat:emiftneiprg7jmgwxayfgzcvxa
« Previous Showing results 1 — 15 out of 39 results