Konferenzbeitrag

How useful are existing monitoring languages for securing android apps?

Lade...
Vorschaubild
Volltext URI
Dokumententyp
Text/Conference Paper
Datum
2013
Zeitschriftentitel
ISSN der Zeitschrift
Bandtitel
Quelle
Software Engineering 2013 - Workshopband
Regular Research Papers
Verlag
Gesellschaft für Informatik e.V.
Zusammenfassung
The Android operating system is currently dominating the mobile device market in terms of penetration and growth rate. An important contributor to its success are a wealth of cheap and easy-to-install mobile applications, known as apps. Today, installing untrusted apps is the norm, though this comes with risks: malware is ubiquitous and can easily leak confidential and sensitive data. In this work, we investigate the extent to which we can specify complex information flow properties using existing specification languages for runtime monitoring, with the goal to encapsulate potentially harmful apps and prevent private data from leaking. By modelling a set of representative, Android-specific security policies with Tracematches, JavaMOP, Dataflow Pointcuts and PQL, we are able to identify policylanguage features that are crucial for effectively defining runtime-enforceable Android security properties. Our evaluation demonstrates that while certain property languages suit our purposes better than others, they all lack essential features that would, if present, allow users to provide effective security guarantees about apps. We discuss those shortcomings and propose several possible mechanisms to overcome them.
Beschreibung
Arzt, Steven; Falzon, Kevin; Follner, Andreas; Rasthofer, Siegfried; Bodden, Eric; Stolz, Volker (2013): How useful are existing monitoring languages for securing android apps?. Software Engineering 2013 - Workshopband. Bonn: Gesellschaft für Informatik e.V.. PISSN: 1617-5468. ISBN: 978-3-88579-609-1. pp. 107-122. Regular Research Papers. Aachen. 26. Februar-1. März 2013
Schlagwörter
Zitierform
DOI
Tags