DocumentCode :
652200
Title :
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain
Author :
Qihui Zhou ; Dan Wang ; Yan Zhang ; Bo Qin ; Aimin Yu ; Baohua Zhao
Author_Institution :
Comput. Sci. & Technol. Dept., Ocean Univ. of China, Qingdao, China
fYear :
2013
fDate :
16-18 July 2013
Firstpage :
156
Lastpage :
162
Abstract :
Smartphone apps are usually unprivileged and need user permission to access protected system resources. Specifically, the existing Android permission system will check whether the calling app has the right permission to invoke sensitive system APIs. Although the inter-application communication in Android gives applications the ability to reuse components from other applications, it also results in a Confused Deputy attack [1] which means a less privileged application can start components in a privileged application. In this paper, we present ChainDroid -- a permission management system combining call chains with access policies to provide safe and flexible access to system APIs. First, when a protected system API is invoked, we construct the call chain which records call relationships among components to prevent unprivileged applications´ access. Second, we create an access policy file for each system API. Unlike other access polices providing attributes merely associated with system APIs, the policy in ChainDroid is based on call chains and therefore constraint attributes (e.g., the maximum number of applications in a chain) are put on the call chain for a certain system API. To facilitate the user´s operation on ChainDroid, we also create an application for the user to set constraint attributes for the target system API. The results show that ChainDroid prevents the Confused Deputy attack with little impact on system performance.
Keywords :
Android (operating system); application program interfaces; authorisation; smart phones; Android permission management system; ChainDroid; Confused Deputy attack; access policy file; call chains; interapplication communication; protected system API; protected system resource; sensitive system API; system performance; Androids; Humanoid robots; Meteorology; Performance evaluation; Security; Smart phones; XML; Access Policy; Android; Call Chain; Permission;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
Type :
conf
DOI :
10.1109/TrustCom.2013.24
Filename :
6680836
Link To Document :
بازگشت