Proceedings of the 30th Annual Computer Security Applications Conference 2014
DOI: 10.1145/2664243.2664264
|View full text |Cite
|
Sign up to set email alerts
|

Scippa

Abstract: Google's Android OS provides a lightweight IPC mechanism called Binder, which enables the development of feature-rich apps that seamlessly integrate services and data of other apps. Whenever apps can act both as service consumers and service providers, it is inevitable that the IPC mechanism provides message receivers with message provenance information to establish trust. However, the Android OS currently fails in providing sufficient provenance information, which has led to a number of attacks.We present an … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…We assume that the SDN controller is trusted and adequately secured but that it may provide services to, and be co-opted by, malicious SDN apps. We assume that apps may originate from third parties 2 , such as app stores 3 , and are thus untrusted and potentially malicious. Although network and security practitioners will use best practices and due diligence in vetting apps before deployment (e.g., verifying that an app has been signed by a trusted developer), compiled apps without available source code are "black boxes" whose behavior the practitioners may not entirely understand and whose code may be vulnerable to compromise in unexpected ways.…”
Section: Threat Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…We assume that the SDN controller is trusted and adequately secured but that it may provide services to, and be co-opted by, malicious SDN apps. We assume that apps may originate from third parties 2 , such as app stores 3 , and are thus untrusted and potentially malicious. Although network and security practitioners will use best practices and due diligence in vetting apps before deployment (e.g., verifying that an app has been signed by a trusted developer), compiled apps without available source code are "black boxes" whose behavior the practitioners may not entirely understand and whose code may be vulnerable to compromise in unexpected ways.…”
Section: Threat Modelmentioning
confidence: 99%
“…Data provenance refers to the process of tracing and recording the origins of data and their movement. Provenance has been used to understand the flow of data in databases [2,13,22,28,86], operating systems [8,45,52,67], mobile phones [3,16], and browsers [40,44]. Provenance can be used not just for IFC but also for information tracing, accountability, transparency, and compliance [51,79].…”
Section: Data Provenance Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The four basic Android application components are Activities, BroadcastReceivers, ContentProviders, and Services. All components can be interconnected remotely across process boundaries by using different abstractions of Binder inter process communication (IPC) [6]. These interconnections are commonly referred to as inter-component communication and are the primary communication mechanism in Android although it can provide classical channels such as files or sockets.…”
Section: Android Security Architecturementioning
confidence: 99%
“…Detection of Android Malware: An extensive body of systems has been developed to detect Android malware by monitoring system calls [15,39,42,43,50,46,30,27], analyzing the usage of Android permissions [24,11,23,38], analyzing the usage of Framework APIs [13,55,47,56,17,52], and extracting information from the sysfs pseudofilesystem [12]. The design of these detection systems requires deep domain knowledge about Android system and the development of Android malware.…”
Section: Related Workmentioning
confidence: 99%