Show simple item record

dc.contributor.authorBagheri, Hamid
dc.contributor.authorKang, Eunsuk
dc.contributor.authorMalek, Sam
dc.contributor.authorJackson, Daniel
dc.date.accessioned2018-08-22T15:20:52Z
dc.date.available2018-09-02T05:00:05Z
dc.date.issued2017-11
dc.identifier.issn0934-5043
dc.identifier.issn1433-299X
dc.identifier.urihttp://hdl.handle.net/1721.1/117468
dc.description.abstractThe ever increasing expansion of mobile applications into nearly every aspect of modern life, from banking to healthcare systems, is making their security more important than ever. Modern smartphone operating systems (OS) rely substantially on the permission-based security model to enforce restrictions on the operations that each application can perform. In this paper, we perform an analysis of the permission protocol implemented in Android, a popular OS for smartphones. We propose a formal model of the Android permission protocol in Alloy, and describe a fully automatic analysis that identifies potential flaws in the protocol. A study of real-world Android applications corroborates our finding that the flaws in the Android permission protocol can have severe security implications, in some cases allowing the attacker to bypass the permission checks entirely. Keywords: Android, Permission protocol, Alloy, Verificationen_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency (Award D11AP00282)en_US
dc.description.sponsorshipUnited States. National Security Agency (H98230-14-C-0140)en_US
dc.description.sponsorshipUnited States. Department of Homeland Security (HSHQDC-14-C-B0040)en_US
dc.description.sponsorshipUnited States. Air Force. Office of Scientific Research (FA95501610030)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (CCF1252644)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (CCF-1618132)en_US
dc.publisherSpringer Londonen_US
dc.relation.isversionofhttps://doi.org/10.1007/s00165-017-0445-zen_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceSpringer Londonen_US
dc.titleA formal approach for detection of security flaws in the android permission systemen_US
dc.typeArticleen_US
dc.identifier.citationBagheri, Hamid, et al. “A Formal Approach for Detection of Security Flaws in the Android Permission System.” Formal Aspects of Computing, vol. 30, no. 5, Sept. 2018, pp. 525–44.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorKang, Eunsuk
dc.contributor.mitauthorJackson, Daniel
dc.relation.journalFormal Aspects of Computingen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2018-08-18T03:40:18Z
dc.language.rfc3066en
dc.rights.holderBritish Computer Society
dspace.orderedauthorsBagheri, Hamid; Kang, Eunsuk; Malek, Sam; Jackson, Danielen_US
dspace.embargo.termsNen
dc.identifier.orcidhttps://orcid.org/0000-0002-0194-3989
dc.identifier.orcidhttps://orcid.org/0000-0003-4864-078X
mit.licenseOPEN_ACCESS_POLICYen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record