Proactive restart as cyber maneuver for Android

作者: Zhiyong Shan , Iulian Neamtiu , Zhiyun Qian , Don Torrieri

DOI: 10.1109/MILCOM.2015.7357412

关键词:

摘要: Moving-target defense is an effective strategy for deflecting cyber attacks. The widespread use of smartphones in the tactical field requires novel ways securing against ever-increasing number zero-day We propose a new, proactive approach smartphone apps certain classes leverage smartphone's native support quick and lossless restarts to make application restart maneuver meant deflect confuse attackers. time-series entropy metric quantify attack resilience. apply our 12 popular Android chosen from variety domains, including online banking shopping. Preliminary experiments with using on these show that promising way increasing resilience class side-channel attacks named Activity Inference

参考文章(16)
Kehuan Zhang, XiaoFeng Wang, Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems usenix security symposium. pp. 17- 32 ,(2009)
Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna, What the App is That? Deception and Countermeasures in the Android User Interface 2015 IEEE Symposium on Security and Privacy. pp. 931- 948 ,(2015) , 10.1109/SP.2015.62
Patrick McDaniel, Srikanth V. Krishnamurthy, Iulian Neamtiu, Trent Jaeger, Thomas F. La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa Marvel, Ananthram Swami, Prasant Mohapatra, Security and Science of Agility computer and communications security. pp. 13- 19 ,(2014) , 10.1145/2663474.2663476
Xiaoyong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A. Gunter, Klara Nahrstedt, Identity, location, disease and more: inferring your secrets from android public resources computer and communications security. pp. 1017- 1028 ,(2013) , 10.1145/2508859.2516661
Md. Tanzirul Azim, Iulian Neamtiu, Lisa M. Marvel, Towards self-healing smartphone software via automated patching automated software engineering. pp. 623- 628 ,(2014) , 10.1145/2642937.2642955
Christoph Bandt, Bernd Pompe, Permutation entropy: a natural complexity measure for time series. Physical Review Letters. ,vol. 88, pp. 174102- ,(2002) , 10.1103/PHYSREVLETT.88.174102
Don Torrieri, Cyber Maneuvers and Maneuver Keys military communications conference. pp. 262- 267 ,(2014) , 10.1109/MILCOM.2014.48
Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan, Android Security: A Survey of Issues, Malware Penetration, and Defenses IEEE Communications Surveys and Tutorials. ,vol. 17, pp. 998- 1022 ,(2015) , 10.1109/COMST.2014.2386139
Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos, Permission evolution in the Android ecosystem Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. pp. 31- 40 ,(2012) , 10.1145/2420950.2420956
Jeff H. Perkins, Greg Sullivan, Weng-Fai Wong, Yoav Zibin, Michael D. Ernst, Martin Rinard, Sunghun Kim, Sam Larsen, Saman Amarasinghe, Jonathan Bachrach, Michael Carbin, Carlos Pacheco, Frank Sherwood, Stelios Sidiroglou, Automatically patching errors in deployed software symposium on operating systems principles. pp. 87- 102 ,(2009) , 10.1145/1629575.1629585