Preview

Xmandroid

Better Essays
Open Document
Open Document
14924 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Xmandroid
¨ Technische Universitat Darmstadt
Center for Advanced Security Research Darmstadt

Technical Report TR-2011-04

XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi

System Security Lab Technische Universit¨t Darmstadt, Germany a

Technische Universit¨t Darmstadt a Center for Advanced Security Research Darmstadt D-64293 Darmstadt, Germany

TR-2011-04 First Revision: April 30, 2011 Last Update: June 30, 2011

XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks
Sven Bugiel sven.bugiel@cased.de Lucas Davi lucas.davi@cased.de Alexandra Dmitrienko alexandra.dmitrienko@cased.de Thomas Fischer thomas.fischer@rub.de Ahmad-Reza Sadeghi ahmad.sadeghi@cased.de System Security Lab Center for Advanced Security Research Darmstadt (CASED) Germany

ABSTRACT
Google Android has become a popular mobile operating system which is increasingly deployed by mobile device manufactures for various platforms. Recent attacks show that Android’s permission framework is vulnerable to applicationlevel privilege escalation attacks, i.e., an application may indirectly gain privileges to perform unauthorized actions. The existing proposals for security extensions to Android’s middleware (e.g., Kirin, Saint, TaintDroid, or QUIRE) cannot fully and adequately mitigate these attacks or detect Trojans such as Soundcomber that exploit covert channels in the Android system. In this paper we present the design and implementation of XManDroid (eXtended Monitoring on Android), a security framework that extends the monitoring mechanism of Android to detect and prevent application-level privilege escalation attacks at runtime based on a systemcentric system policy. Our implementation dynamically analyzes applications’ transitive permission usage while inducing a minimal performance overhead unnoticeable for the user. Depending on system policy

You May Also Find These Documents Helpful

  • Satisfactory Essays

    X

    • 483 Words
    • 2 Pages

    supports the trial court's conclusion that Bourque did not assume the risk of Duplechin's negligent act.…

    • 483 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    CIS 500 Term Papaer

    • 3105 Words
    • 10 Pages

    "Lookout 's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012…

    • 3105 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Satisfactory Essays

    Malclom X

    • 338 Words
    • 2 Pages

    Also from the Life magazine did focused on how he talked about “Whitey.” Then the New Post focused what his followers thought about the situation. Also the New York Times focused on how his followers been with a groups of Muslim. Then Amsterdam news focused on a conspiracy with the Muslim community. The Associated Press on Hagan and how he murdered Malcolm x.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Lab #1

    • 2039 Words
    • 9 Pages

    Set-UID is an important security mechanism in Unix operating systems. When a Set-UID program is run, it assumes the owner’s privileges. For example, if the program’s owner is root, then when anyone runs this program, the program gains the root’s privileges during its execution. Set-UID allows us to do many interesting things, but unfortunately, it is also the culprit of many bad things. Therefore, the objective of this lab is two-fold:…

    • 2039 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Xtrinax

    • 1390 Words
    • 6 Pages

    Write a report explaining the role of communication and interpersonal interactions in the Health & Social Care Context.…

    • 1390 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The growth of social networks and smartphones over the past few years has come with a dangerous side-effect: the violation of privacy and security. Social networks such as Facebook and Twitter may appear to be a fun way to keep in touch or to easily socialize with friends and family, but as these networks continue to grow some very serious privacy and security concerns emerge. Interestingly these concerns could be easily prevented by any educated user. The problem occurs when social network and smartphone companies force the average user to have to work towards gaining this education by hiding or not fully explaining some of their settings and features. One of the biggest cases of this is the recent emergence of coordinate-based apps on smartphones. In many of these apps, location services – a setting that allows the app to record the user’s exact coordinates at a given time – is turned on by default; the average user may never even be aware of its existence. This is not the only example of technology designed to follow people, there are many more new features being developed all the time to track and record an individual’s movements, despite their fun and harmless appearance; user education has become necessary for security.…

    • 1470 Words
    • 6 Pages
    Good Essays
  • Best Essays

    cow papper english

    • 1388 Words
    • 6 Pages

    National Science Foundation. (2010). Can Clever Hackers Target Smart Phones? Retrieved August 27, 2010, from http://www.nsf.gov/news/news_summ.jsp?cntn_id=116723…

    • 1388 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Securing Mobile Devices. (n.d.). Information Technology - Information Security – Information Assurance | ISACA. Retrieved from http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Securing-Mobile-Devices.aspx…

    • 1427 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Three of the most important types of Linux security technologies are Security Enhanced Linux (SELinux), chroot jail, and iptables. This security measures aide in the subversion of theft and malicious activity. We will discuss these items in depth to address who created them and for what reason. Along with how these technologies changed the operating system to enforce security, and the types of threats that these security systems are design to eliminate.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Throughout the last few years, jail-breaking portable devices has become a new platform which individuals use to share files. Although it’s legal to jail-break your iPhone or Android, there are many arguments on the ethics of doing so. Some people believe that it is ok to jailbreak to the extent you don’t cause businesses or app developers to lose profit. While others argue that jail-breaking is just a tool used to enjoy your device and explore the cool features it has. However, jail-breaking your device excludes the limitation in which it can function. It gives you the ability to “install software from sources other than the Apple’s App Store.” In addition, “It allows apps to access the iOS filesystem…

    • 1969 Words
    • 8 Pages
    Better Essays
  • Best Essays

    We analyze the security risks confronted by mobile computing and present the existing security mechanisms. The cloud model has motivated industry and academia to adopt cloud computing to host a…

    • 2039 Words
    • 9 Pages
    Best Essays