Visible to the public CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices

TitleCASE: Comprehensive Application Security Enforcement on COTS Mobile Devices
Publication TypeConference Paper
Year of Publication2016
AuthorsZhu, Suwen, Lu, Long, Singh, Kapil
Conference NameProceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4269-8
KeywordsCollaboration, concealed handler, dual-layer interception, human factors, Metrics, module-level security, native-safe pages, pubcrawl, Resiliency, safe coding standards
Abstract

Without violating existing app security enforcement, malicious modules inside apps, such as a library or an external class, can steal private data and abuse sensitive capabilities meant for other modules inside the same apps. These so-called "module-level attacks" are quickly emerging, fueled by the pervasive use of third-party code in apps and the lack of module-level security enforcement on mobile platforms. To systematically thwart the threats, we build CASE, an automatic app patching tool used by app developers to enable module-level security in their apps built for COTS Android devices. During runtime, patched apps enforce developer-supplied security policies that regulate interactions among modules at the granularity of a Java class. Requiring no changes or special support from the Android OS, the enforcement is complete in covering inter-module crossings in apps and is robust against malicious Java and native app modules. We evaluate CASE with 420 popular apps and a set of Android's unit tests. The results show that CASE is fully compatible with the tested apps and incurs an average performance overhead of 4.9%.

URLhttp://doi.acm.org/10.1145/2906388.2906413
DOI10.1145/2906388.2906413
Citation Keyzhu_case:_2016