Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

DroidForce: Enforcing complex, data-centric, system-wide policies in Android

 
: Rasthofer, Siegfried; Arzt, Steven; Lovat, Enrico; Bodden, Eric

:

Institute of Electrical and Electronics Engineers -IEEE-; IEEE Computer Society:
Ninth International Conference on Availability, Reliability and Security, ARES 2014 : Fribourg, Switzerland, 8 - 12 September 2014; Including workshops
Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2014
ISBN: 978-1-4799-4223-7
ISBN: 978-1-4799-7876-2
pp.40-49
International Conference on Availability, Reliability, and Security (ARES) <9, 2014, Fribourg>
English
Conference Paper
Fraunhofer SIT ()

Abstract
Smartphones are nowadays used to store and process many kinds of privacy-sensitive data such as contacts, photos, and e-mails. Sensors provide access to the phone's physical location, and can record audio and video. While this is convenient for many applications, it also makes smartphones a worthwhile target for attackers providing malicious applications. Current approaches to runtime enforcement try to mitigate unauthorized leaks of confidential data. However, they are often capable of enforcing only a very limited set of policies, like preventing data leaks only within single components or monitoring access only to specific sensitive system resources. In this work, we present Droid Force, an approach for enforcing complex, data-centric, system-wide policies on Android applications. Droid Force allows users to specify fine-grained constraints on how and when which data may be processed on their phones, regardless of whether the malicious behavior is distributed over different colluding components or even applications. Policies can be dynamically exchanged at runtime and no modifications to the operating system nor root access to the phone are required. Droid Force works purely on the application level. It provides a centralized policy decision point as a dedicated Android application and it instruments a decentralized policy enforcement point into every target application. Analyzing and instrumenting an application takes in total less than a minute and secured applications exhibit no noticeable slowdown in practice.

: http://publica.fraunhofer.de/documents/N-374685.html