150 likes | 399 Views
Towards Taming Privilege-Escalation Attacks on Android. S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry in 19th Annual Network & Distributed System Security Symposium (NDSS 2012). [Online Available]. Yoonyong Shin yshi091 4889476. Summary.
E N D
Towards Taming Privilege-Escalation Attacks on Android S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry in 19th Annual Network & Distributed System Security Symposium (NDSS 2012). [Online Available] Yoonyong Shin yshi091 4889476
Summary • Problem: Confused deputy attack and Collusion attack in Android. By Yoonyong Shin
Summary • Problem: Confused deputy attack and Collusion attack in Android. • Aim: Create a practical security framework that can defend against both Confused deputy attack and Collusion attack. By Yoonyong Shin
Summary • Problem: Confused deputy attack and Collusion attack in Android. • Aim: Create a practical security framework that can defend against both Confused deputy attack and Collusion attack. • Method: Heuristic analysis of Android’s system behavior. By Yoonyong Shin
Summary • Problem: Confused deputy attack and Collusion attack in Android. • Aim: Create a practical security framework that can defend against both Confused deputy attack and Collusion attack. • Method: Heuristic analysis of Android’s system behavior. • Solution: System-centric, Policy-driven and runtime Monitoring security framework. By Yoonyong Shin
Summary • Problem: Confused deputy attack and Collusion attack in Android. • Aim: Create a practical security framework that can defend against both Confused deputy attack and Collusion attack. • Method: Heuristic analysis of Android’s system behavior. • Solution: System-centric, Policy-driven and runtime Monitoring security framework. • Remedy: Different types of profile. ( Default < Basic < Advanced < Strong) By Yoonyong Shin
Good “…framework which can capture all variations of application-level privilege attacks, as opposite to previous works targeting attack subclasses.” by Sven Bugiel et al. Contribution to the Android security field By Yoonyong Shin
Good “…framework which can capture all variations of application-level privilege attacks, as opposite to previous works targeting attack subclasses.” by Sven Bugiel et al. Contribution to the Android security field • Broad problem domain. (Linux Inter Process Communication, File System, Unix Domain, Internet Sockets and Inter Component Communication) By Yoonyong Shin
Good “…framework which can capture all variations of application-level privilege attacks, as opposite to previous works targeting attack subclasses.” by Sven Bugiel et al. Contribution to the Android security field • Broad problem domain. (Linux Inter Process Communication, File System, Unix Domain, Internet Sockets and Inter Component Communication) • Persistent and Motivation for Android security development. (Detail plan of future works. E.g., extensive user tests, more application test, binder level ICC call-chain verification and SELinux integration) By Yoonyong Shin
Bad “Our evaluation results show that our framework is efficient, effective and usable.” by Sven Bugiel et al. Effectiveness and Usability By Yoonyong Shin
Bad “Our evaluation results show that our framework is efficient, effective and usable.” by Sven Bugiel et al. Effectiveness and Usability • 50 popular applications representing 600,000 Android applications. By Yoonyong Shin
Bad “Our evaluation results show that our framework is efficient, effective and usable.” by Sven Bugiel et al. Effectiveness and Usability • 50 popular applications representing 600,000 Android applications. • More number of permissions combination is required. By Yoonyong Shin
Bad “Our evaluation results show that our framework is efficient, effective and usable.” by Sven Bugiel et al. Effectiveness and Usability • 50 popular applications representing 600,000 Android applications. • More number of permissions combination is required. Consequence: incompatibility to legacy application By Yoonyong Shin
Bad (Cont.) Usability • System-centric framework on Android 2.2.1 (Froyo) require update every now and then. (Most updated version is 4.1.X Jelly Bean) By Yoonyong Shin
Question Within Smartphone features we discussed so far, How much would you restrict usability over better security? By Yoonyong Shin