Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security 2013
DOI: 10.1145/2484313.2484317
|View full text |Cite
|
Sign up to set email alerts
|

On the effectiveness of API-level access control using bytecode rewriting in Android

Abstract: Bytecode rewriting on Android applications has been widely adopted to implement fine-grained access control. It endows more flexibility and convenience without modifying the Android platform. Bytecode rewriting uses static analysis to identify the usage of security-sensitive API methods, before it instruments the bytecode to control the access to these API calls. Due to the significance of this technique, the effectiveness of its performance in providing fine-grained access control is crucial. We have provided… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(26 citation statements)
references
References 9 publications
0
25
0
Order By: Relevance
“…For Policy Manager, the main implementation detail that needs to be explained is how Policy Manager communicates with instrumented apps to enforce control policies. Java Instrumentation Java Instrumentation (or bytecode rewriting) techniques generally undergo three steps as disassembling, modifying assembly code, and reassembling [16,17,19]. They make modifications to the intermediate assembly code files (like smali [20]) generated by disassembling tools (like apktool [21]) and reassemble the modified code into a new dex file.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For Policy Manager, the main implementation detail that needs to be explained is how Policy Manager communicates with instrumented apps to enforce control policies. Java Instrumentation Java Instrumentation (or bytecode rewriting) techniques generally undergo three steps as disassembling, modifying assembly code, and reassembling [16,17,19]. They make modifications to the intermediate assembly code files (like smali [20]) generated by disassembling tools (like apktool [21]) and reassemble the modified code into a new dex file.…”
Section: Methodsmentioning
confidence: 99%
“…Hao et al [19] showed the possibility that Android apps can access system services directly through IPC to evade API-level access control. To prevent such an evasion, we hook the Binder IPC to prevent apps from accessing sensors in such a direct way.…”
Section: Methodsmentioning
confidence: 99%
“…Another widely researched technique to protect Android systems is Dalvik bytecode rewriting [20]. The basic idea is to detect the portions of an application that call securitysensitive APIs and to redirect the calls to a monitor service that implements fine-grained access control.…”
Section: A System Protectionmentioning
confidence: 99%
“…Reference [10] adopted bytecode rewriting to implement fine-grained access control at the API level. Reference [11] proposed DroidTrack, a method for tracking the diffusion of personal information and preventing its leakage on Android device.…”
Section: Related Workmentioning
confidence: 99%