CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices
Title | CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Zhu, Suwen, Lu, Long, Singh, Kapil |
Conference Name | Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4269-8 |
Keywords | Collaboration, concealed handler, dual-layer interception, human factors, Metrics, module-level security, native-safe pages, pubcrawl, Resiliency, safe coding standards |
Abstract | Without violating existing app security enforcement, malicious modules inside apps, such as a library or an external class, can steal private data and abuse sensitive capabilities meant for other modules inside the same apps. These so-called "module-level attacks" are quickly emerging, fueled by the pervasive use of third-party code in apps and the lack of module-level security enforcement on mobile platforms. To systematically thwart the threats, we build CASE, an automatic app patching tool used by app developers to enable module-level security in their apps built for COTS Android devices. During runtime, patched apps enforce developer-supplied security policies that regulate interactions among modules at the granularity of a Java class. Requiring no changes or special support from the Android OS, the enforcement is complete in covering inter-module crossings in apps and is robust against malicious Java and native app modules. We evaluate CASE with 420 popular apps and a set of Android's unit tests. The results show that CASE is fully compatible with the tested apps and incurs an average performance overhead of 4.9%. |
URL | http://doi.acm.org/10.1145/2906388.2906413 |
DOI | 10.1145/2906388.2906413 |
Citation Key | zhu_case:_2016 |