A collaborative policy-based security scheme to enforce resource access controlling mechanism

作者: K. Muthumanickam , P. C. Senthil Mahesh

DOI: 10.1007/S11276-019-01984-X

关键词: Computer securityExploitComputer scienceInformation technologyPermissionAndroid (operating system)

摘要: Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming attractive target for cyber criminals to exploit due its predefined permission model. Without classification, system permits installation of applications all kinds, including Trojans, thus making trustworthiness into question. In this paper, we present a security called collaborative policy-based scheme (CSS) that customize access permissions Android during runtime. The proposed CSS validates each application before being installed. experimental results show successfully detects malicious with run-time overhead 2.7%.

参考文章(27)
Ramesh Govindan, Suman Nath, Jie Liu, Bin Liu, DECAF: detecting and characterizing ad fraud in mobile apps networked systems design and implementation. pp. 57- 70 ,(2014) , 10.5555/2616448.2616455
Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala, Quantitative Security Risk Assessment of Android Permissions and Applications Lecture Notes in Computer Science. pp. 226- 241 ,(2013) , 10.1007/978-3-642-39256-6_15
Te-En Wei, Hsiao-Rong Tyan, Albert B. Jeng, Hahn-Ming Lee, Hong-Yuan Mark Liao, Jiunn-Chin Wang, DroidExec: Root exploit malware recognition against wide variability via folding redundant function-relation graph international conference on advanced communication technology. pp. 161- 169 ,(2015) , 10.1109/ICACT.2015.7224777
Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, X. Sean Wang, Binyu Zang, Vetting undesirable behaviors in android apps with permission use analysis computer and communications security. pp. 611- 622 ,(2013) , 10.1145/2508859.2516689
J. Jamaluddin, N. Zotou, R. Edwards, P. Coulton, Mobile phone vulnerabilities: a new generation of malware international symposium on consumer electronics. pp. 199- 202 ,(2004) , 10.1109/ISCE.2004.1375935
William Enck, Machigar Ongtang, Patrick McDaniel, On lightweight mobile phone application certification computer and communications security. pp. 235- 245 ,(2009) , 10.1145/1653662.1653691
Dean Kramer, Anna Kocurova, Samia Oussena, Tony Clark, Peter Komisarczuk, An extensible, self contained, layered approach to context acquisition Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing - M-MPAC '11. pp. 6- ,(2011) , 10.1145/2090316.2090322
Kabakus Abdullah Talha, Dogru Ibrahim Alper, Cetin Aydin, APK Auditor: Permission-based Android malware detection system Digital Investigation. ,vol. 13, pp. 1- 14 ,(2015) , 10.1016/J.DIIN.2015.01.001
Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang, Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 1828- 1842 ,(2014) , 10.1109/TIFS.2014.2347206