5,787 research outputs found

    The Transitivity of Trust Problem in the Interaction of Android Applications

    Full text link
    Mobile phones have developed into complex platforms with large numbers of installed applications and a wide range of sensitive data. Application security policies limit the permissions of each installed application. As applications may interact, restricting single applications may create a false sense of security for the end users while data may still leave the mobile phone through other applications. Instead, the information flow needs to be policed for the composite system of applications in a transparent and usable manner. In this paper, we propose to employ static analysis based on the software architecture and focused data flow analysis to scalably detect information flows between components. Specifically, we aim to reveal transitivity of trust problems in multi-component mobile platforms. We demonstrate the feasibility of our approach with Android applications, although the generalization of the analysis to similar composition-based architectures, such as Service-oriented Architecture, can also be explored in the future

    Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android

    Get PDF
    A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap". Malware can leverage the unused permissions for achieving their malicious goals, for instance using code injection. In this paper, we present an approach to detecting permission gaps using static analysis. Our prototype implementation in the context of Android shows that the static analysis must take into account a significant amount of platform-specific knowledge. Using our tool on two datasets of Android applications, we found out that a non negligible part of applications suffers from permission gaps, i.e. does not use all the permissions they declare

    A metadata extracting tool for software components in grid applications

    Get PDF
    Component-based programming aims at producing higher quality software, increasing the reuse of components and permitting late composition. In the context of component-based programming, applications are treated as composition of components. Given an application composition, some of the components might have been developed outside the context of the application or its domain. As a result, the overall efficiency of the composition, in terms of cost and performance, becomes non-deterministic - may not be guaranteed to be efficient enough, even if the individual components have been proven to be efficient. In other words, two primary goals of software practice, efficiency and quality, do conflict with each other. In this paper, we argue that, this problem can partly be overcome by paying more attention to component-specific information, component metadata, during composition. We describe a possible means of extracting and organising the metadata and formats for specifying the metadata. Our scheme is independent of component- and programming-models and extensible. We see our work as a precursor to a possible runtime scheme, where we intend to facilitate extraction, maintenance and usage of component metadata at runtime
    corecore