語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Self-Protection of Android Systems f...
~
Hammad, Mahmoud M.
FindBook
Google Book
Amazon
博客來
Self-Protection of Android Systems from Inter-Component Communication Attacks.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Self-Protection of Android Systems from Inter-Component Communication Attacks./
作者:
Hammad, Mahmoud M.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
面頁冊數:
213 p.
附註:
Source: Dissertations Abstracts International, Volume: 80-06, Section: B.
Contained By:
Dissertations Abstracts International80-06B.
標題:
Information Technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10930659
ISBN:
9780438745001
Self-Protection of Android Systems from Inter-Component Communication Attacks.
Hammad, Mahmoud M.
Self-Protection of Android Systems from Inter-Component Communication Attacks.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 213 p.
Source: Dissertations Abstracts International, Volume: 80-06, Section: B.
Thesis (Ph.D.)--University of California, Irvine, 2018.
This item must not be sold to any third party vendors.
Android is widely used for the development and deployment of autonomous and smart systems, including software targeted for IoT and mobile devices. Security of such systems is an increasingly important concern. Although Android is the predominant mobile platform, it is also the most targeted platform by malware authors resulting in millions of malicious apps distributed in numerous app stores. Android relies on a permission model to secure the system's resources and apps. In Android, since the permissions are granted at the granularity of apps, and all components in an app inherit those permissions, an app's components are over-privileged, i.e., components are granted more privileges than they actually need. Systematic violation of least-privilege principle in Android is the root cause of many types of Inter-Component Communication (ICC) attacks that can lead to serious security and privacy risks. Due to the increasing use of code obfuscation in Android apps, the current security mechanisms for Android apps, both static and dynamic analysis approaches, are insufficient for detection and prevention of the increasingly dynamic and sophisticated security attacks. Static analysis approaches suffer from false positives whereas dynamic analysis approaches suffer from false negatives. Moreover, they all lack the ability to efficiently analyze systems with incremental changes-such as adding/removing apps, granting/revoking permissions, and dynamic components' communications. Each time the system changes, the entire analysis needs to be repeated, making the existing approaches inefficient for practical use. To mitigate these issues, this dissertation presents a novel self-protecting Android software system that automatically determines and continuously maintains the least-privilege architecture of an Android system, incrementally and efficiently analyzes its security posture, and dynamically enforces the maintained least-privilege architecture at runtime. The approach, entitled SALMA, protects the system against ICC attacks at all times in spite of changes at runtime. The least-privilege architecture limits the privileges granted to apps without the need to modify them or breaking their functionalities. Static program analysis techniques have been utilized to extract the exact privileges each component needs for providing its functionality. A Multiple-Domain Matrix representation of the system's least-privilege architecture is then kept in sync with the running system to reason about it at runtime. Every time the system changes, SALMA determines (1) the impacted part of the system, and (2) the subset of the security analyses that need to be performed, thereby greatly improving the performance and the scalability of the approach. All conducted experiments on hundreds of real-world apps corroborate the scalability and efficiency of the proposed approach in reducing the attack surface of Android systems as well as its ability to detect and prevent security attacks at runtime with minimal disruption.
ISBN: 9780438745001Subjects--Topical Terms:
1030799
Information Technology.
Self-Protection of Android Systems from Inter-Component Communication Attacks.
LDR
:04138nmm a2200337 4500
001
2205619
005
20190828120327.5
008
201008s2018 ||||||||||||||||| ||eng d
020
$a
9780438745001
035
$a
(MiAaPQ)AAI10930659
035
$a
(MiAaPQ)uci:15304
035
$a
AAI10930659
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Hammad, Mahmoud M.
$3
3432483
245
1 0
$a
Self-Protection of Android Systems from Inter-Component Communication Attacks.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
213 p.
500
$a
Source: Dissertations Abstracts International, Volume: 80-06, Section: B.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Malek, Sam.
502
$a
Thesis (Ph.D.)--University of California, Irvine, 2018.
506
$a
This item must not be sold to any third party vendors.
520
$a
Android is widely used for the development and deployment of autonomous and smart systems, including software targeted for IoT and mobile devices. Security of such systems is an increasingly important concern. Although Android is the predominant mobile platform, it is also the most targeted platform by malware authors resulting in millions of malicious apps distributed in numerous app stores. Android relies on a permission model to secure the system's resources and apps. In Android, since the permissions are granted at the granularity of apps, and all components in an app inherit those permissions, an app's components are over-privileged, i.e., components are granted more privileges than they actually need. Systematic violation of least-privilege principle in Android is the root cause of many types of Inter-Component Communication (ICC) attacks that can lead to serious security and privacy risks. Due to the increasing use of code obfuscation in Android apps, the current security mechanisms for Android apps, both static and dynamic analysis approaches, are insufficient for detection and prevention of the increasingly dynamic and sophisticated security attacks. Static analysis approaches suffer from false positives whereas dynamic analysis approaches suffer from false negatives. Moreover, they all lack the ability to efficiently analyze systems with incremental changes-such as adding/removing apps, granting/revoking permissions, and dynamic components' communications. Each time the system changes, the entire analysis needs to be repeated, making the existing approaches inefficient for practical use. To mitigate these issues, this dissertation presents a novel self-protecting Android software system that automatically determines and continuously maintains the least-privilege architecture of an Android system, incrementally and efficiently analyzes its security posture, and dynamically enforces the maintained least-privilege architecture at runtime. The approach, entitled SALMA, protects the system against ICC attacks at all times in spite of changes at runtime. The least-privilege architecture limits the privileges granted to apps without the need to modify them or breaking their functionalities. Static program analysis techniques have been utilized to extract the exact privileges each component needs for providing its functionality. A Multiple-Domain Matrix representation of the system's least-privilege architecture is then kept in sync with the running system to reason about it at runtime. Every time the system changes, SALMA determines (1) the impacted part of the system, and (2) the subset of the security analyses that need to be performed, thereby greatly improving the performance and the scalability of the approach. All conducted experiments on hundreds of real-world apps corroborate the scalability and efficiency of the proposed approach in reducing the attack surface of Android systems as well as its ability to detect and prevent security attacks at runtime with minimal disruption.
590
$a
School code: 0030.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Information science.
$3
554358
650
4
$a
Computer science.
$3
523869
690
$a
0489
690
$a
0723
690
$a
0984
710
2
$a
University of California, Irvine.
$b
Computer Science.
$3
2099759
773
0
$t
Dissertations Abstracts International
$g
80-06B.
790
$a
0030
791
$a
Ph.D.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10930659
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9382168
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入