2014
DOI: 10.1007/978-3-319-06410-9_21
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Runtime Monitoring with Metric Temporal Logic: A Case Study in the Android Operating System

Abstract: Abstract. We present a design and an implementation of a security policy specification language based on metric linear-time temporal logic (MTL). MTL features temporal operators that are indexed by time intervals, allowing one to specify timing-dependent security policies. The design of the language is driven by the problem of runtime monitoring of applications in mobile devices. A main case the study is the privilege escalation attack in the Android operating system, where an app gains access to certain resou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(20 citation statements)
references
References 20 publications
0
20
0
Order By: Relevance
“…They show that past formulas can be converted to deterministic timed automata (DTA) and that there are future formulas that cannot be represented by a DTA. There exist trace-length independent monitors for ptLTL extended with counting quantifiers [19], and ptMTL extended with recursive definitions [26]. D'Angelo et al [14] propose an online algorithm for a stream processing language called LOLA that supports past and future references.…”
Section: Space Efficient Algorithms Havelund and Roşumentioning
confidence: 99%
“…They show that past formulas can be converted to deterministic timed automata (DTA) and that there are future formulas that cannot be represented by a DTA. There exist trace-length independent monitors for ptLTL extended with counting quantifiers [19], and ptMTL extended with recursive definitions [26]. D'Angelo et al [14] propose an online algorithm for a stream processing language called LOLA that supports past and future references.…”
Section: Space Efficient Algorithms Havelund and Roşumentioning
confidence: 99%
“…Combining static analysis, model checking and runtime monitoring, they are able to detect the violation of contextual policies of Android applications. Gunadi and Tiu (Gunadi and Tiu 2013) propose a security policy specification language to describe privilege escalation on Android. The language is based on metric linear-time temporal logic (MTL) plus an extension of recursive definitions.…”
Section: Attack Representationmentioning
confidence: 99%
“…Android malware varies in many aspects such as attack targets, attack methods, and applied obfuscation techniques. For example, Android malware may steal users' sensitive information (Grace et al 2012;Arzt et al 2014a), elevate their privilege (Xing et al 2014;Gunadi and Tiu 2013), deplete device resources (Vekris et al 2012;Pathak et al 2012), and remote control users' devices (Zhou and Jiang 2012). Malware may accomplish attack missions either individually or collaboratively (Octeau et al 2013;Bosu et al 2017), perform attacks only once or periodically (Zhou and Jiang 2012), and be triggered by the installation or a broadcast message.…”
Section: Introductionmentioning
confidence: 99%
“…Examples include requirements monitoring ( Maiden, 2013;Robinson, 2006 ), monitoring of architectural properties ( Muccini et al, 2007 ), complex event processing ( Völz et al, 2011 ), and runtime verification ( Calinescu et al, 2012;, to name but a few. The desired runtime behavior is often formally expressed using temporal logic ( Viswanathan and Kim, 2005;Gunadi and Tiu, 2014;Bauer et al, 2006 ), or through the use of domain-specific (constraint) languages ( Robinson, 2006;Baresi and Guinea, 2013;Phan et al, 2008;Vierhauser et al, 2015 ). Defined constraints are checked based on events and data collected from systems at runtime, e.g., through instrumentation ( Mansouri-Samani and Sloman, 1993 ).…”
Section: Introductionmentioning
confidence: 99%