• DocumentCode
    652200
  • Title

    ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain

  • Author

    Qihui Zhou ; Dan Wang ; Yan Zhang ; Bo Qin ; Aimin Yu ; Baohua Zhao

  • Author_Institution
    Comput. Sci. & Technol. Dept., Ocean Univ. of China, Qingdao, China
  • fYear
    2013
  • fDate
    16-18 July 2013
  • Firstpage
    156
  • Lastpage
    162
  • Abstract
    Smartphone apps are usually unprivileged and need user permission to access protected system resources. Specifically, the existing Android permission system will check whether the calling app has the right permission to invoke sensitive system APIs. Although the inter-application communication in Android gives applications the ability to reuse components from other applications, it also results in a Confused Deputy attack [1] which means a less privileged application can start components in a privileged application. In this paper, we present ChainDroid -- a permission management system combining call chains with access policies to provide safe and flexible access to system APIs. First, when a protected system API is invoked, we construct the call chain which records call relationships among components to prevent unprivileged applications´ access. Second, we create an access policy file for each system API. Unlike other access polices providing attributes merely associated with system APIs, the policy in ChainDroid is based on call chains and therefore constraint attributes (e.g., the maximum number of applications in a chain) are put on the call chain for a certain system API. To facilitate the user´s operation on ChainDroid, we also create an application for the user to set constraint attributes for the target system API. The results show that ChainDroid prevents the Confused Deputy attack with little impact on system performance.
  • Keywords
    Android (operating system); application program interfaces; authorisation; smart phones; Android permission management system; ChainDroid; Confused Deputy attack; access policy file; call chains; interapplication communication; protected system API; protected system resource; sensitive system API; system performance; Androids; Humanoid robots; Meteorology; Performance evaluation; Security; Smart phones; XML; Access Policy; Android; Call Chain; Permission;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
  • Conference_Location
    Melbourne, VIC
  • Type

    conf

  • DOI
    10.1109/TrustCom.2013.24
  • Filename
    6680836