SlideShare a Scribd company logo
1 of 20
Download to read offline
SecureDroid:  An  Android  Security  
Framework  Extension  for  Context-­‐‑
Aware  policy  Enforcement	
V.Arena, V. Catania,
G. La Torre, S. Monteleone
Department of Electrical,
Electronics and Computer
Engineering
University of Catania - Italy
PRISM  2013,  International  Conference  on  Privacy  and  Security  in  Mobile  Systems	
June  24-­‐‑27,  2013  Atlantic  City,  NJ,  USA	
	
F. Ricciato
Innovation and Industry
Relations
Telecom Italia S.p.A. - Italy
What  do  we  do  with  our  
smartphone?	
Call  +  Text  =  ~  17%
Mobile  Applications	
v Plenty of applications in online markets
v Loss of money, loss of personal information
v Users’ security depends on applications’ security
Applications’  Security  in  
Mobile  OSs	
v Apple – App Store
v Microsoft – Windows Phone Store
v Google – Google Play
v Applications are signed and must specify permissions
v User consent
v Isolation
v Once an application has been installed it gets access
to required permissions until it will be uninstalled
Google’s  guideline  about  
application’s  security	
Android has no mechanism for granting
permissions dynamically (at run-time)
because it complicates the user
experience to the detriment of security
PARTIALLY  TRUE  …
Android  Security  
Framework	
v  Permissions  are  granted  
only  during  installation	
v  Accept  all  or  cannot  install	
v  Users  don’t  pay  aXention  to  
them	
v  Downloads’  count  and  
users’  comments  are  
more  effective.
Android  Security  
Framework	
Android’s security framework checks for permissions
when one of the following situations occurs.
v An application wants to access to a particular
functionality protected by a permission (e.g. GPS
information),
v An application tries to start an activity of another
application,
v Both when an application sends and receives
broadcasts,
v An application tries to access and operate on a
content provider and
v When binding to or starting a service.
SecureDroid	
v Extends Android Security Framework
v  Standard security control still remains
v  Compatible with applications from market
Provides the possibility to:
v Check custom policies at runtime
v Specify policies after an application has been
installed
v Use context information as policy’s constraints
v Allow multiple parties to set policies
v Handle policy enforcement: PolicyDenyException
User’s  Context	
v  User Context: mobile devices follow the users
v  Context from sensors, device status, …
v  Applications’ behavior may depend on user/device’s
context
Some examples
v  Deny notification from app X while my position is in the
range (Lat, Lon, R)
v  Deny Internet access to App Y if my device is roaming
v  Allow only my girlfriend to call me when I’m running
Policy  Model	
	
v Based on XACML
v Subject information from certificate
v  Package, author, distributor, …
v Resource information from the application
v  Android permissions e.g android.permission.INTERNET
v  Content provider URI
v Context information from sensors
v  Battery level
v  User’s Position
v  Roaming
v  Accelerometer, gyroscope, …
Policy	
<policy−set combine=”deny−overrides” description=“User’s policyset”> "
<policy combine=”deny−overrides”> "
<target> "
<subject> "
<subject−match attr=”id” match=”com.example.exampleApp”/> "
</subject>"
</target> "
<rule effect=”prompt-session”>"
<condition> "
<resource−match attr=”android-permission” "
match=”android.permission.INTERNET”/>"
"
<resource−match attr=”uri”

match=”http://blockedsite.org∗”/>"
"
<environment−match attr =”connection−type” "
match=”mobile−roaming”/> "
</condition> "
</rule> "
<rule effect=”permit”> "
</policy> "
</policy−set>
SecureDroid’s  Architecture	
Get  
capability	
1.  PEP  sends  to  CH  subject’s  
information  about  the  App  
(e.g.  Certificate)  and  the  
required  capability  (e.g.  
INTERNET)	
2.  CH  asks  the  PAP  which  context  
information  are  required  for  
the  subject  (e.g.  Roaming)	
3.  CH  asks  to  PIP  the  current  
value  for  context  (Roaming)	
4.  CH  creates  a  request  and  asks  
to  PDP  to  evaluate  the  policy  
for  given  subject,  resources  and  
context	
App	
PEP	
PAP	
Security  Manager  	
                    Service	
Context	
Handler	
Policy	
PDP	
PIP	
Sensors,  	
Device  status	
1	
2	
3	
4	
5	
Read/	
Write	
policies
Request	
Request 
Subject
Attribute AttributeId=”id”
AttributeValuecom.example.exampleApp/AttributeValue
/Attribute
Attribute AttributeId=”author-signature”
AttributeValueBzx62xM45Lc34/AttributeValue
/Attribute
/Subject
Resources 
Attribute AttributeId=”android-permission 
AttributeValueandroid.permission.INTERNET/AttributeValue 
/Attribute
Attribute AttributeId=”uri 
AttributeValuehttp://blockedsite.org/some_content.html/AttributeValue
/Attribute
/Resources
Environment
Attribute AttributeId=”connection-type 
AttributeValuemobile-roaming/AttributeValue
/Attribute 
/Environment
/Request
Run-­‐‑Time  policy  
enforcement
Who  can  set  policies?	
v Manufacturer
v Operator (e.g. Branded smartphones)
v Third-parties (e.g. Museum, Company, …)
v User
SecurityManagerService class:
v Defines READ_POLICY and WRITE_POLICY permissions
v Provides readPolicy and writePolicy methods
Policy  Management  UI	
My Context
Overall  evaluation	
Android  Check	
SecureDroid  Check	
Application  requires  
a  capability  at  
runtime	
1.  Is  a  system  app/service?	
2.  Is  the  permission  declared  in  
the  manifest?	
Policies  evaluation  order	
Manufacturer    Operator    Third-­‐‑parties    User	
Allow	
Deny	
SecureDroid  
won’t  be  
invoked
Scenarios	
v User’s context-aware policies
v Companies: Bring Your Own Device
v Museum: Deny camera
Conclusions  and    
Future  Works	
Our contribute: SecureDroid
v Acts at system level: platform extension
v Enforces context-aware policies at runtime
v Allows multiple parties to set policies
Future Work
v Analysis of user-experience in dealing with Policy
Management UI
v  Improve context selection
v Help users in choosing policies
v  Similar applications  Similar policy in similar context
Thanks  for  your  aXention!	
Giuseppe  La  Torre	
PhD  Student	
University  of  Catania  (ITALY)	
giuseppe.latorre@dieei.unict.it	
Q

More Related Content

What's hot

CIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCloudIDSummit
 
CEH Ver.7 and ECSA LPT
CEH Ver.7 and ECSA LPTCEH Ver.7 and ECSA LPT
CEH Ver.7 and ECSA LPTfiliani
 
2.Public Vulnerability Databases
2.Public Vulnerability Databases2.Public Vulnerability Databases
2.Public Vulnerability Databasesphanleson
 
Keynote Session : Kill The Password
Keynote Session : Kill The PasswordKeynote Session : Kill The Password
Keynote Session : Kill The PasswordPriyanka Aash
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...AM Publications
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...DevOps Indonesia
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksMarco Morana
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008Jim Geovedi
 
Hacking ble smartwatch
Hacking ble smartwatch Hacking ble smartwatch
Hacking ble smartwatch idsecconf
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2ShivamSharma909
 
Intelligent Application Security
Intelligent Application SecurityIntelligent Application Security
Intelligent Application SecurityPriyanka Aash
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSTobias Koprowski
 
Unisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_finalUnisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_finalKoko Fontana
 

What's hot (20)

CIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from PilotsCIS13: NSTIC Update and Reports from Pilots
CIS13: NSTIC Update and Reports from Pilots
 
CEH Ver.7 and ECSA LPT
CEH Ver.7 and ECSA LPTCEH Ver.7 and ECSA LPT
CEH Ver.7 and ECSA LPT
 
2.Public Vulnerability Databases
2.Public Vulnerability Databases2.Public Vulnerability Databases
2.Public Vulnerability Databases
 
Keynote Session : Kill The Password
Keynote Session : Kill The PasswordKeynote Session : Kill The Password
Keynote Session : Kill The Password
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
 
Ecsa LPT V8 brochure
Ecsa LPT V8 brochureEcsa LPT V8 brochure
Ecsa LPT V8 brochure
 
Hacking ble smartwatch
Hacking ble smartwatch Hacking ble smartwatch
Hacking ble smartwatch
 
C01461422
C01461422C01461422
C01461422
 
VSEC Sourcecode Review Service Profile
VSEC Sourcecode Review Service ProfileVSEC Sourcecode Review Service Profile
VSEC Sourcecode Review Service Profile
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
web security
web securityweb security
web security
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2
 
Intelligent Application Security
Intelligent Application SecurityIntelligent Application Security
Intelligent Application Security
 
DataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPSDataMindsConnect2018_SECDEVOPS
DataMindsConnect2018_SECDEVOPS
 
Unisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_finalUnisys_AppDefender_Symantec_CFD_0_1_final
Unisys_AppDefender_Symantec_CFD_0_1_final
 

Viewers also liked

Capturing policies for fine-grained access control on mobile devices
Capturing policies for fine-grained access control on mobile devicesCapturing policies for fine-grained access control on mobile devices
Capturing policies for fine-grained access control on mobile devicesPrajit Kumar Das
 
SeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentSeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentUS-Ignite
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Matthias Braunhofer
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsSteph Cliche
 
Context-Aware Access Control and Presentation of Linked Data
Context-Aware Access Control and Presentation of Linked DataContext-Aware Access Control and Presentation of Linked Data
Context-Aware Access Control and Presentation of Linked DataLuca Costabello
 
Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Natalia Díaz Rodríguez
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
Secure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computingSecure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computingVille Seppänen
 
Parse: A Mobile Backend as a Service (MBaaS)
Parse: A Mobile Backend as a Service (MBaaS)Parse: A Mobile Backend as a Service (MBaaS)
Parse: A Mobile Backend as a Service (MBaaS)Ville Seppänen
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 

Viewers also liked (13)

Context-aware mobile messages
Context-aware mobile messagesContext-aware mobile messages
Context-aware mobile messages
 
Capturing policies for fine-grained access control on mobile devices
Capturing policies for fine-grained access control on mobile devicesCapturing policies for fine-grained access control on mobile devices
Capturing policies for fine-grained access control on mobile devices
 
Access control
Access controlAccess control
Access control
 
SeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentSeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application Containment
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
 
Ieee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systemsIeee project-2014-2015-context-based-access-control-systems
Ieee project-2014-2015-context-based-access-control-systems
 
Context-Aware Access Control and Presentation of Linked Data
Context-Aware Access Control and Presentation of Linked DataContext-Aware Access Control and Presentation of Linked Data
Context-Aware Access Control and Presentation of Linked Data
 
Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...Semantic security framework and context-aware role-based access control ontol...
Semantic security framework and context-aware role-based access control ontol...
 
Android security
Android securityAndroid security
Android security
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Secure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computingSecure context-awareness in ubiquitous computing
Secure context-awareness in ubiquitous computing
 
Parse: A Mobile Backend as a Service (MBaaS)
Parse: A Mobile Backend as a Service (MBaaS)Parse: A Mobile Backend as a Service (MBaaS)
Parse: A Mobile Backend as a Service (MBaaS)
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 

Similar to SecureDroid: An Android Security Framework Extension for Context-Aware policy Enforcement

Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsCognizant
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Oliver Pfaff
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityMohammad Khreesha
 
IT-Security@Contemporary Life
IT-Security@Contemporary LifeIT-Security@Contemporary Life
IT-Security@Contemporary LifeOliver Pfaff
 
What is needed to start trusting the security of your applications in the cloud?
What is needed to start trusting the security of your applications in the cloud?What is needed to start trusting the security of your applications in the cloud?
What is needed to start trusting the security of your applications in the cloud?PECB
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesIRJET Journal
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing IRJET Journal
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices FrameworkSujata Raskar
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium SecurityJack Mannino
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsGeorge Fletcher
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays
 

Similar to SecureDroid: An Android Security Framework Extension for Context-Aware policy Enforcement (20)

Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 
IT-Security@Contemporary Life
IT-Security@Contemporary LifeIT-Security@Contemporary Life
IT-Security@Contemporary Life
 
Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016
 
What is needed to start trusting the security of your applications in the cloud?
What is needed to start trusting the security of your applications in the cloud?What is needed to start trusting the security of your applications in the cloud?
What is needed to start trusting the security of your applications in the cloud?
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
I018145157
I018145157I018145157
I018145157
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Android Security
Android SecurityAndroid Security
Android Security
 
Dm36678681
Dm36678681Dm36678681
Dm36678681
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

SecureDroid: An Android Security Framework Extension for Context-Aware policy Enforcement

  • 1. SecureDroid:  An  Android  Security   Framework  Extension  for  Context-­‐‑ Aware  policy  Enforcement V.Arena, V. Catania, G. La Torre, S. Monteleone Department of Electrical, Electronics and Computer Engineering University of Catania - Italy PRISM  2013,  International  Conference  on  Privacy  and  Security  in  Mobile  Systems June  24-­‐‑27,  2013  Atlantic  City,  NJ,  USA F. Ricciato Innovation and Industry Relations Telecom Italia S.p.A. - Italy
  • 2. What  do  we  do  with  our   smartphone? Call  +  Text  =  ~  17%
  • 3. Mobile  Applications v Plenty of applications in online markets v Loss of money, loss of personal information v Users’ security depends on applications’ security
  • 4. Applications’  Security  in   Mobile  OSs v Apple – App Store v Microsoft – Windows Phone Store v Google – Google Play v Applications are signed and must specify permissions v User consent v Isolation v Once an application has been installed it gets access to required permissions until it will be uninstalled
  • 5. Google’s  guideline  about   application’s  security Android has no mechanism for granting permissions dynamically (at run-time) because it complicates the user experience to the detriment of security PARTIALLY  TRUE  …
  • 6. Android  Security   Framework v  Permissions  are  granted   only  during  installation v  Accept  all  or  cannot  install v  Users  don’t  pay  aXention  to   them v  Downloads’  count  and   users’  comments  are   more  effective.
  • 7. Android  Security   Framework Android’s security framework checks for permissions when one of the following situations occurs. v An application wants to access to a particular functionality protected by a permission (e.g. GPS information), v An application tries to start an activity of another application, v Both when an application sends and receives broadcasts, v An application tries to access and operate on a content provider and v When binding to or starting a service.
  • 8. SecureDroid v Extends Android Security Framework v  Standard security control still remains v  Compatible with applications from market Provides the possibility to: v Check custom policies at runtime v Specify policies after an application has been installed v Use context information as policy’s constraints v Allow multiple parties to set policies v Handle policy enforcement: PolicyDenyException
  • 9. User’s  Context v  User Context: mobile devices follow the users v  Context from sensors, device status, … v  Applications’ behavior may depend on user/device’s context Some examples v  Deny notification from app X while my position is in the range (Lat, Lon, R) v  Deny Internet access to App Y if my device is roaming v  Allow only my girlfriend to call me when I’m running
  • 10. Policy  Model v Based on XACML v Subject information from certificate v  Package, author, distributor, … v Resource information from the application v  Android permissions e.g android.permission.INTERNET v  Content provider URI v Context information from sensors v  Battery level v  User’s Position v  Roaming v  Accelerometer, gyroscope, …
  • 11. Policy <policy−set combine=”deny−overrides” description=“User’s policyset”> " <policy combine=”deny−overrides”> " <target> " <subject> " <subject−match attr=”id” match=”com.example.exampleApp”/> " </subject>" </target> " <rule effect=”prompt-session”>" <condition> " <resource−match attr=”android-permission” " match=”android.permission.INTERNET”/>" " <resource−match attr=”uri”
 match=”http://blockedsite.org∗”/>" " <environment−match attr =”connection−type” " match=”mobile−roaming”/> " </condition> " </rule> " <rule effect=”permit”> " </policy> " </policy−set>
  • 12. SecureDroid’s  Architecture Get   capability 1.  PEP  sends  to  CH  subject’s   information  about  the  App   (e.g.  Certificate)  and  the   required  capability  (e.g.   INTERNET) 2.  CH  asks  the  PAP  which  context   information  are  required  for   the  subject  (e.g.  Roaming) 3.  CH  asks  to  PIP  the  current   value  for  context  (Roaming) 4.  CH  creates  a  request  and  asks   to  PDP  to  evaluate  the  policy   for  given  subject,  resources  and   context App PEP PAP Security  Manager                      Service Context Handler Policy PDP PIP Sensors,   Device  status 1 2 3 4 5 Read/ Write policies
  • 13. Request Request Subject Attribute AttributeId=”id” AttributeValuecom.example.exampleApp/AttributeValue /Attribute Attribute AttributeId=”author-signature” AttributeValueBzx62xM45Lc34/AttributeValue /Attribute /Subject Resources Attribute AttributeId=”android-permission AttributeValueandroid.permission.INTERNET/AttributeValue /Attribute Attribute AttributeId=”uri AttributeValuehttp://blockedsite.org/some_content.html/AttributeValue /Attribute /Resources Environment Attribute AttributeId=”connection-type AttributeValuemobile-roaming/AttributeValue /Attribute /Environment /Request
  • 15. Who  can  set  policies? v Manufacturer v Operator (e.g. Branded smartphones) v Third-parties (e.g. Museum, Company, …) v User SecurityManagerService class: v Defines READ_POLICY and WRITE_POLICY permissions v Provides readPolicy and writePolicy methods
  • 17. Overall  evaluation Android  Check SecureDroid  Check Application  requires   a  capability  at   runtime 1.  Is  a  system  app/service? 2.  Is  the  permission  declared  in   the  manifest? Policies  evaluation  order Manufacturer    Operator    Third-­‐‑parties    User Allow Deny SecureDroid   won’t  be   invoked
  • 18. Scenarios v User’s context-aware policies v Companies: Bring Your Own Device v Museum: Deny camera
  • 19. Conclusions  and     Future  Works Our contribute: SecureDroid v Acts at system level: platform extension v Enforces context-aware policies at runtime v Allows multiple parties to set policies Future Work v Analysis of user-experience in dealing with Policy Management UI v  Improve context selection v Help users in choosing policies v  Similar applications Similar policy in similar context
  • 20. Thanks  for  your  aXention! Giuseppe  La  Torre PhD  Student University  of  Catania  (ITALY) giuseppe.latorre@dieei.unict.it Q