作者: Collin Mulliner , Giovanni Vigna , David Dagon , Wenke Lee
DOI: 10.1007/11790754_6
关键词:
摘要: Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types network services available to mobile applications. However, integration allows an attacker cross service boundaries. For example, attack carried out through wireless interface may eventually provide access phone functionality. This type attacks can cause considerable damage because some (e.g., GSM-based services) charge user based on traffic or time use. In this paper, we demonstrate feasibility these by developing a proof-of-concept exploit crosses To address security issues, developed solution resource labeling. We modified kernel integrated device so processes files marked in way one regulate system resources. Labels set when certain accessed. The labeling is then transferred between resources as result either execution. also defined language for creating rules, demonstrated how be used prevent attempt Experimental evaluation shows implementation introduces little overhead. Our orthogonal other protection schemes provides critical defense growing problem viruses worms