How to Block the Malicious Access to Android External Storage

被引:3
|
作者
Yuan, Sisi [1 ,2 ,3 ]
Wang, Yuewu [2 ,3 ]
Wang, Pingjian [2 ,3 ]
Lei, Lingguang [2 ,3 ]
Zhou, Quan [2 ,3 ]
Li, Jun [4 ]
机构
[1] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[3] Chinese Acad Sci, Data Assurance & Commun Secur Res Ctr, Beijing, Peoples R China
[4] Zhongxing Telecommun Equipment Corp, Shenzhen, Peoples R China
关键词
Access Control List; Android access control; External storage; Ransomware; SYSTEM;
D O I
10.1007/978-3-030-12146-4_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
External storage (e.g., SD card) is an important component of the Android mobile terminals, commonly used for storing of the user information (including sensitive data such as photos). However, current protection mechanisms (e.g., the permission mechanism) on the external storage are somehow coarse-grained, where the external storage is controlled as a whole, which means all files on the external storage are accessible once the permission is assigned to an APP. This coarse-grained control weakness could be easily leveraged by the attackers. For example, the ransomware can obtain the access permission of the external storage and encrypt the files on external storage stealthily for ransom. In this paper, we introduce an Access Control List (ACL) mechanism to enforce the fine-grained control on the external storage. With ACL, the access control policy can be defined at the file granularity, and the access permissions will only be granted to legitimate APPs specified in a white list. First, we activate the Linux ACL mechanism on Android system and extend it to the Filesystem in Userspace (FUSE). Because the external storage is built on the FUSE filesystem, which is different from the traditional Linux filesystems (e.g., EXT4) and thus not supported by the traditional Linux ACL mechanism. Second, we introduce ACL-policy configuration interface in the Android framework, which enables the device owner and APP developers to set the fine-grained ACL access policies for their files on the external storage. Finally, we implement a prototype based on the Nexus 6 devices deployed Android 6.0.1 and Linux kernel 3.10.4, and evaluate it on the stability, effectiveness and performance. The results show our prototype system can effectively prevent illegal access to the files on the external storage with negligible performance overhead. As far as we know, this is the first work that can really enforce ACL access control on the external storage of Android.
引用
收藏
页码:287 / 303
页数:17
相关论文
共 50 条
  • [41] On the use of artificial malicious patterns for android malware detection
    Jerbi, Manel
    Dagdia, Zaineb Chelly
    Bechikh, Slim
    Ben Said, Lamjed
    COMPUTERS & SECURITY, 2020, 92 (92)
  • [42] Malicious code detection for Android using Instruction Signatures
    Hu Ge
    Li Ting
    Dong Hang
    Yu Hewei
    Zhang Miao
    2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 332 - 337
  • [43] Lexical Mining of Malicious URLs for Classifying Android Malware
    Wang, Shanshan
    Yan, Qiben
    Chen, Zhenxiang
    Wang, Lin
    Spolaor, Riccardo
    Yang, Bo
    Conti, Mauro
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 248 - 263
  • [44] ARRAY ACCESS BOUNDS FOR BLOCK STORAGE MEMORY-SYSTEMS
    PARK, A
    BALASUBRAMANIAN, K
    LIPTON, RJ
    IEEE TRANSACTIONS ON COMPUTERS, 1989, 38 (06) : 909 - 913
  • [45] Analysis of Block Access Address Correlation in Enterprise VDI Storage
    Kumano, Tatsuo
    Ozawa, Toshihiro
    PROCEEDINGS 2016 5TH IIAI INTERNATIONAL CONGRESS ON ADVANCED APPLIED INFORMATICS IIAI-AAI 2016, 2016, : 959 - 964
  • [46] Android Malware Clustering Through Malicious Payload Mining
    Li, Yuping
    Jang, Jiyong
    Hu, Xin
    Ou, Xinming
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES (RAID 2017), 2017, 10453 : 192 - 214
  • [48] Malicious Application Traffic Detection and Identification for Mobile Android Devices
    Niu, Geng
    INFORMATICA-AN INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS, 2022, 46 (08): : 67 - 72
  • [49] Identifying malicious Android apps using permissions and system events
    Han, Hongmu
    Li, Ruixuan
    Gu, Xiwu
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2016, 8 (01) : 46 - 58
  • [50] Androanalyzer: Android Malicious Software Detection Based on Deep Learning
    Arslan R.S.
    PeerJ Computer Science, 2021, 7 : 1 - 20