A collaborative policy-based security scheme to enforce resource access controlling mechanism

Wireless Networks - Tập 26 - Trang 2537-2547 - 2019
K. Muthumanickam1, P. C. Senthil Mahesh2
1Department of Computer Science and Engineering, Arunai Engineering College, Tiruvannamalai, India
2Department of Computer Science and Engineering, Annamacharya Institute of Technology and Sciences, Rajampet, India

Tóm tắt

Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined permission model. Without classification, the mobile operating system permits installation of mobile applications of all kinds, including Trojans, thus making its trustworthiness into question. In this paper, we present a security system called collaborative policy-based security scheme (CSS) that permits users to customize the access permissions of Android applications during runtime. The proposed CSS security scheme validates the trustworthiness of each application before being installed. The experimental results show that the proposed CSS successfully detects all malicious applications with a run-time overhead of 2.7%.

Tài liệu tham khảo

Zhang, Y., Wei, T., Song, D., Xue, H. (2013) Ad vulna: a vulnaggressive (vulnerable & aggressive) adware threatening millions. Threat Res.

Enck, W., Ongtang, M., & McDaniel, P. Mitigating android software misuse before it happens, Technical Report (NAS-TR-0094-2008), Network and Security Research center.

Crussell, J., Stevens, R., & Chen, H. (2014) MadFraud: investigating Ad Fraud in android applications. In Proceedings of the 12th annual international conference on Mobile systems, applications, and services (pp. 123–134).

Zhang, Y., Yang, M., Yang, Z., Gu, G., Niry, P., & Zang, B. (2013) Permission use analysis to vetting undesirable behaviors in android applications. In Proceedings of the ACM SIGSAC conference on Computer & communications security (pp. 611–622).

Zou, S., Zhang, J., & Lin, X. (2015). An effective behavior-based Android malware detection system. Security and Communication Networks,8(12), 2079–2089.

Russello, G., Jimenez, A. B., Naderi, H., & Vander Mark, W. (2013) FireDroid: Hardening security in almost stock android. In Proceedings of the 29th annual computer security applications conference (ACSAC’13) (pp. 319–328).

Liu, B., Nath, S., Govinder, R., & Liu,J. (2014) DECAF: Detecting and characterizing adfraud in mobile application. In Proceedings of the 11th USENIX conference on networked systems design and implementation (NSDI’14) (pp. 57–70).

Barr, K., Bungale, P., Deasy, S., Gyuris, V., Hung, P., Newell, C., et al. (2010). The VMware mobile virtualization platform: is that a hypervisor in your pocket. ACM SIGOPS Operating Systems Review,44(4), 124–135.

Android Open Source Project (ASOP). Available: http://source.android.com/. Accessed on March 2017.

Divide webpage. Available: http://www.divide.com/. Accessed on July 2017.