9 research outputs found

    A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

    Full text link
    We present a taxonomy and an algebra for attack patterns on component-based operating systems. In a multilevel security scenario, where isolation of partitions containing data at different security classifications is the primary security goal and security breaches are mainly defined as undesired disclosure or modification of classified data, strict control of information flows is the ultimate goal. In order to prevent undesired information flows, we provide a classification of information flow types in a component-based operating system and, by this, possible patterns to attack the system. The systematic consideration of informations flows reveals a specific type of operating system covert channel, the covert physical channel, which connects two former isolated partitions by emitting physical signals into the computer's environment and receiving them at another interface.Comment: 9 page

    A Mobile application for administering access control on mobile devices

    Get PDF
    Thesis submitted in partial fulfillment of the requirements for the Degree of Master of Science in Mobile Telecommunication and Innovation at (MSc.MTI) at Strathmore UniversityMobile phones have become an integral part in our daily lives where services are now being offered through mobile applications. These applications rely on the mobile phone’s local storage to store application specific data and also user data. This results to sensitive data ranging from personal data to corporate data being stored on the mobile phones which need to be protected from unauthorised people in case of malicious people trying to access sensitive data, theft or misplacement of the mobile phone. Control on the access of these sensitive data needs to be taken into consideration. This research is aimed at finding the different types of access control mechanisms and which one will be best suited for a mobile device by determining the features that need to be included in order to provide a comprehensive secure access control mechanism. Therefore, this led to the development of a mobile application that aims at preventing unauthorised users from accessing sensitive data on the mobile phone. The development of the application was achieved using the Agile Software Development Methodology since it provides a more flexible approach with the changing needs of the user and to easily add new functionalities whenever they are identified. This methodology eased the process of user acceptability as the user was involved in the development process. Testing and validations of the final system was done to ensure the solution solves the problems specified in th

    Formal network behaviour analysis using model checking

    Get PDF
    In this research we modelled computer network devices to ensure their communication behaviours meet various network standards. By modelling devices as finite-state machines and examining their properties in a range of configurations, we discovered a flaw in a common network protocol and produced a technique to improve organisations' network security against data theft

    Towards Modular and Flexible Access Control on Smart Mobile Devices

    Get PDF
    Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily personal and professional lives. These devices are connected to a wide variety of Internet services and host a vast amount of applications, which access, store and process security- and privacy-sensitive data. A rich set of sensors, ranging from microphones and cameras to location and acceleration sensors, allows these applications and their back end services to reason about user behavior. Further, enterprise administrators integrate smart mobile devices into their IT infrastructures to enable comfortable work on the go. Unsurprisingly, this abundance of available high-quality information has made smart mobile devices an interesting target for attackers, and the number of malicious and privacy-intrusive applications has steadily been rising. Detection and mitigation of such malicious behavior are in focus of mobile security research today. In particular, the Android operating system has received special attention by both academia and industry due to its popularity and open-source character. Related work has scrutinized its security architecture, analyzed attack vectors and vulnerabilities and proposed a wide variety of security extensions. While these extensions have diverse goals, many of them constitute modifications of the Android operating system and extend its default permission-based access control model. However, they are not generic and only address specific security and privacy concerns. The goal of this dissertation is to provide generic and extensible system-centric access control architectures, which can serve as a solid foundation for the instantiation of use-case specific security extensions. In doing so, we enable security researchers, enterprise administrators and end users to design, deploy and distribute security extensions without further modification of the underlying operating system. To achieve this goal, we first analyze the mobile device ecosystem and discuss how Android's security architecture aims to address its inherent threats. We proceed to survey related work on Android security, focusing on system-centric security extensions, and derive a set of generic requirements for extensible access control architectures targeting smart mobile devices. We then present two extensible access control architectures, which address these requirements by providing policy-based and programmable interfaces for the instantiation of use-case specific security solutions. By implementing a set of practical use-cases, ranging from context-aware access control, dynamic application behavior analysis to isolation of security domains we demonstrate the advantages of system-centric access control architectures over application-layer approaches. Finally, we conclude this dissertation by discussing an alternative approach, which is based on application-layer deputies and can be deployed whenever practical limitations prohibit the deployment of system-centric solutions

    Anais...

    Get PDF
    bitstream/item/140976/1/final8081.pdfJINC 2015
    corecore