How to Block the Malicious Access to Android External Storage

被引:3
|
作者
Yuan, Sisi [1 ,2 ,3 ]
Wang, Yuewu [2 ,3 ]
Wang, Pingjian [2 ,3 ]
Lei, Lingguang [2 ,3 ]
Zhou, Quan [2 ,3 ]
Li, Jun [4 ]
机构
[1] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[3] Chinese Acad Sci, Data Assurance & Commun Secur Res Ctr, Beijing, Peoples R China
[4] Zhongxing Telecommun Equipment Corp, Shenzhen, Peoples R China
关键词
Access Control List; Android access control; External storage; Ransomware; SYSTEM;
D O I
10.1007/978-3-030-12146-4_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
External storage (e.g., SD card) is an important component of the Android mobile terminals, commonly used for storing of the user information (including sensitive data such as photos). However, current protection mechanisms (e.g., the permission mechanism) on the external storage are somehow coarse-grained, where the external storage is controlled as a whole, which means all files on the external storage are accessible once the permission is assigned to an APP. This coarse-grained control weakness could be easily leveraged by the attackers. For example, the ransomware can obtain the access permission of the external storage and encrypt the files on external storage stealthily for ransom. In this paper, we introduce an Access Control List (ACL) mechanism to enforce the fine-grained control on the external storage. With ACL, the access control policy can be defined at the file granularity, and the access permissions will only be granted to legitimate APPs specified in a white list. First, we activate the Linux ACL mechanism on Android system and extend it to the Filesystem in Userspace (FUSE). Because the external storage is built on the FUSE filesystem, which is different from the traditional Linux filesystems (e.g., EXT4) and thus not supported by the traditional Linux ACL mechanism. Second, we introduce ACL-policy configuration interface in the Android framework, which enables the device owner and APP developers to set the fine-grained ACL access policies for their files on the external storage. Finally, we implement a prototype based on the Nexus 6 devices deployed Android 6.0.1 and Linux kernel 3.10.4, and evaluate it on the stability, effectiveness and performance. The results show our prototype system can effectively prevent illegal access to the files on the external storage with negligible performance overhead. As far as we know, this is the first work that can really enforce ACL access control on the external storage of Android.
引用
收藏
页码:287 / 303
页数:17
相关论文
共 50 条
  • [31] SensDroid: Analysis for Malicious Activity Risk of Android Application
    Shrivastava, Gulshan
    Kumar, Prabhat
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (24) : 35713 - 35731
  • [32] Network-based detection of Android malicious apps
    Shree Garg
    Sateesh K. Peddoju
    Anil K. Sarje
    International Journal of Information Security, 2017, 16 : 385 - 400
  • [33] Malicious Behavior Analysis of Android GUI Based on ADB
    Yang, Li
    Wang, Lijun
    Zhang, Dongdong
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 147 - 153
  • [34] Network-based detection of Android malicious apps
    Garg, Shree
    Peddoju, Sateesh K.
    Sarje, Anil K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (04) : 385 - 400
  • [35] ApkClassiFy: Identification and Classification of packed Android Malicious Applications
    Guo, Xu
    Zheng, Tao
    Chen, Xingshu
    Wang, Qixu
    Shao, Jiang
    Hu, Zhijie
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2092 - 2097
  • [36] DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications
    Gupta, Charu
    Singh, Rakesh Kumar
    Bhatia, Simran Kaur
    Mohapatra, Amar Kumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (04) : 57 - 73
  • [37] Malicious Application Detection and Classification System for Android Mobiles
    Malik, Sapna
    Khatter, Kiran
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2018, 9 (01) : 95 - 114
  • [38] Detection of Android Malicious Apps Based on the Sensitive Behaviors
    Quan, Daiyong
    Zhai, Lidong
    Yang, Fan
    Wang, Peng
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 877 - 883
  • [39] Modeling and Capturing Malicious Behavior to Detect Android Malware
    El AassaL, Ayman
    Huang, Shou-Hsuan Stephen
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 2, ICICT 2024, 2024, 1012 : 325 - 335
  • [40] Detecting Malicious Android Applications from Runtime Behavior
    Lageman, Nathaniel
    Lindsey, Mark
    Glodek, William
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 324 - 329