Title :
A Small But Non-negligible Flaw in the Android Permission Scheme
Author :
Shin, Wook ; Kwak, Sanghoon ; Kiyomoto, Shinsaku ; Fukushima, Kazuhide ; Tanaka, Toshiaki
Author_Institution :
KDDI R&D Labs. Inc., Saitama, Japan
Abstract :
This paper presents a flaw in the permission scheme of Android. The Android framework enforces a permission-based security policy where an application can access the other parts of the system only when the application is explicitly permitted. The security of the framework depends to a large extent on the owner of a device since the authorization decisions are mainly made by the user. As a result, the permission scheme imposes much of the administrative burden on the user instead of keeping it simple. Moreover, the framework does not impose enough controls nor support dynamic adjustment in the following respects: No naming rule or constraint is applied for a new permission declaration; once an application acquires a permission, the permission is never revoked during the lifetime of the application, two different permissions can be in use having the same name. These features of the framework can result in a security flaw. We explain how we found the flaw, demonstrate an exploit example, and discuss the solution.
Keywords :
authorisation; mobile computing; operating systems (computers); Android permission scheme; permission-based security policy; security flaw; Authorization; Credit cards; Mobile handsets; Permission; Android; Permission; Vulnerability;
Conference_Titel :
Policies for Distributed Systems and Networks (POLICY), 2010 IEEE International Symposium on
Conference_Location :
Fairfax, VA
Print_ISBN :
978-1-4244-8206-1
Electronic_ISBN :
978-0-7695-4238-6
DOI :
10.1109/POLICY.2010.11