Reputation Based Security Model for Android Applications

作者: Welderufael Berhane Tesfay , Todd Booth , Karl Andersson

DOI: 10.1109/TRUSTCOM.2012.236

关键词: Computer scienceAndroid (operating system)ReputationComputer securityInter-process communicationEnd userWorld Wide WebPopularityComputer security modelCloud computingUnique user

摘要: The market for smart phones has been booming in the past few years. There are now over 400,000 applications on Android market. Over 10 billion have downloaded from Due to popularity, there a large number of malicious vendors targeting platform. Many honest end users being successfully hacked regular basis. In this work, cloud based reputation security model proposed as solution which greatly mitigates attacks Our takes advantage fact that each application android platform is assigned unique user id (UID). stores an anti-malware providers' (AM Cloud). experimental results witness could well identify index given and hence its potential risky or not.

参考文章(14)
Timothy Vidas, Nicolas Christin, Daniel Votipka, All your droid are belong to us: a survey of current android attacks WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies. pp. 10- 10 ,(2011)
Clemens Orthacker, Peter Teufl, Stefan Kraxberger, Günther Lackner, Michael Gissing, Alexander Marsalek, Johannes Leibetseder, Oliver Prevenhueber, Android Security Permissions – Can We Trust Them? security and privacy in mobile information and communication systems. pp. 40- 51 ,(2011) , 10.1007/978-3-642-30244-2_4
Han Bing, Analysis and Research of System Security Based on Android international conference on intelligent computation technology and automation. pp. 581- 584 ,(2012) , 10.1109/ICICTA.2012.152
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, C. Glezer, Google Android: A Comprehensive Security Assessment ieee symposium on security and privacy. ,vol. 8, pp. 35- 44 ,(2010) , 10.1109/MSP.2010.2
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner, Analyzing inter-application communication in Android Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11. pp. 239- 252 ,(2011) , 10.1145/1999995.2000018
Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, Sahin Albayrak, An Android Application Sandbox system for suspicious software detection international conference on malicious and unwanted software. pp. 55- 62 ,(2010) , 10.1109/MALWARE.2010.5665792
Lili Qi, Network Security Analysis Based on Reputation Evaluation international conference of information technology, computer engineering and management sciences. ,vol. 2, pp. 69- 71 ,(2011) , 10.1109/ICM.2011.309
Asaf Shabtai, Yuval Fledel, Yuval Elovici, Securing Android-Powered Mobile Devices Using SELinux ieee symposium on security and privacy. ,vol. 8, pp. 36- 44 ,(2010) , 10.1109/MSP.2009.144
Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Towards Formal Analysis of the Permission-Based Security Model for Android international conference on wireless and mobile communications. pp. 87- 92 ,(2009) , 10.1109/ICWMC.2009.21