How to Block the Malicious Access to Android External Storage

被引:3
|
作者
Yuan, Sisi [1 ,2 ,3 ]
Wang, Yuewu [2 ,3 ]
Wang, Pingjian [2 ,3 ]
Lei, Lingguang [2 ,3 ]
Zhou, Quan [2 ,3 ]
Li, Jun [4 ]
机构
[1] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[3] Chinese Acad Sci, Data Assurance & Commun Secur Res Ctr, Beijing, Peoples R China
[4] Zhongxing Telecommun Equipment Corp, Shenzhen, Peoples R China
关键词
Access Control List; Android access control; External storage; Ransomware; SYSTEM;
D O I
10.1007/978-3-030-12146-4_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
External storage (e.g., SD card) is an important component of the Android mobile terminals, commonly used for storing of the user information (including sensitive data such as photos). However, current protection mechanisms (e.g., the permission mechanism) on the external storage are somehow coarse-grained, where the external storage is controlled as a whole, which means all files on the external storage are accessible once the permission is assigned to an APP. This coarse-grained control weakness could be easily leveraged by the attackers. For example, the ransomware can obtain the access permission of the external storage and encrypt the files on external storage stealthily for ransom. In this paper, we introduce an Access Control List (ACL) mechanism to enforce the fine-grained control on the external storage. With ACL, the access control policy can be defined at the file granularity, and the access permissions will only be granted to legitimate APPs specified in a white list. First, we activate the Linux ACL mechanism on Android system and extend it to the Filesystem in Userspace (FUSE). Because the external storage is built on the FUSE filesystem, which is different from the traditional Linux filesystems (e.g., EXT4) and thus not supported by the traditional Linux ACL mechanism. Second, we introduce ACL-policy configuration interface in the Android framework, which enables the device owner and APP developers to set the fine-grained ACL access policies for their files on the external storage. Finally, we implement a prototype based on the Nexus 6 devices deployed Android 6.0.1 and Linux kernel 3.10.4, and evaluate it on the stability, effectiveness and performance. The results show our prototype system can effectively prevent illegal access to the files on the external storage with negligible performance overhead. As far as we know, this is the first work that can really enforce ACL access control on the external storage of Android.
引用
收藏
页码:287 / 303
页数:17
相关论文
共 50 条
  • [21] Permuting Data on Random-Access Block Storage
    Thonangi, Risi
    Yang, Jun
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (09): : 721 - 732
  • [22] Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers
    Susilo, Willy
    Jiang, Peng
    Lai, Jianchang
    Guo, Fuchun
    Yang, Guomin
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 2138 - 2148
  • [23] MsDroid: Identifying Malicious Snippets for Android Malware Detection
    He, Yiling
    Li, Yiping
    Wu, Lei
    Yang, Ziqi
    Ren, Kui
    Qin, Zhan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2025 - 2039
  • [24] Visualizing Android Malicious Applications Using Texture Features
    Sharma, Tejpal
    Rattan, Dhavleesh
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2023, 23 (06)
  • [25] On the Efficacy of Static Features to Detect Malicious Applications in Android
    Geneiatakis, Dimitris
    Satta, Riccardo
    Fovino, Igor Nai
    Neisse, Ricardo
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 87 - 98
  • [26] A Review of Static Detection Methods for Android Malicious Application
    Pan J.
    Cui Z.
    Lin G.
    Chen X.
    Zheng L.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (08): : 1875 - 1894
  • [27] SensDroid: Analysis for Malicious Activity Risk of Android Application
    Gulshan Shrivastava
    Prabhat Kumar
    Multimedia Tools and Applications, 2019, 78 : 35713 - 35731
  • [28] Malicious Android Application Detection Based on Composite Features
    Xiao, Jingxu
    Xu, Kaiyong
    Duan, Jialiang
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019), 2019,
  • [29] Malicious application detection in android - A systematic literature review
    Sharma, Tejpal
    Rattan, Dhavleesh
    COMPUTER SCIENCE REVIEW, 2021, 40
  • [30] Malicious Intentions: Android Internet Permission Security Risks
    Andah, John Mark
    Chen, Jinfu
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 111 - 120