Show simple item record

dc.contributor.authorBagheri, Hamid
dc.contributor.authorKang, Eunsuk
dc.contributor.authorJackson, Daniel N.
dc.contributor.authorMalek, Sam
dc.date.accessioned2019-06-10T19:16:16Z
dc.date.available2019-06-10T19:16:16Z
dc.date.issued2015
dc.identifier.isbn978-3-319-19248-2
dc.identifier.isbn978-3-319-19249-9
dc.identifier.urihttps://hdl.handle.net/1721.1/121239
dc.description.abstractThe ever increasing expansion of mobile applications into nearly every aspect of modern life, from banking to healthcare systems, is making their security more important than ever. Modern smartphone operating systems (OS) rely substantially on the permission-based security model to enforce restrictions on the operations that each application can perform. In this paper, we perform an analysis of the permission protocol implemented in Android, a popular OS for smartphones. We propose a formal model of the Android permission protocol in Alloy, and describe a fully automatic analysis that identifies potential flaws in the protocol. A study of real-world Android applications corroborates our finding that the flaws in the Android permission protocol can have severe security implications, in some cases allowing the attacker to bypass the permission checks entirely. Keywords: Protection Level, Content Provider, Design Flaw, Custom Permission, Alloy Analyzeren_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency (Award D11AP00282)en_US
dc.description.sponsorshipUnited States. National Security Agency (H98230-14-C-0140)en_US
dc.description.sponsorshipUnited States. Department of Homeland Security (HSHQDC-14-C-B0040)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (CCF-1252644)en_US
dc.language.isoen
dc.publisherSpringer Nature America, Incen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-319-19249-9_6en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleDetection of Design Flaws in the Android Permission Protocol Through Bounded Verificationen_US
dc.typeArticleen_US
dc.identifier.citationBagheri, Hamid, et al. “Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification.” Proceedings of FM 2015: Formal Methods, edited by Nikolaj Bjørner and Frank de Boer, vol. 9109, Springer International Publishing, 2015, pp. 73–89.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.relation.journalProceedings of FM 2015: Formal Methodsen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2019-05-31T17:16:22Z
dspace.date.submission2019-05-31T17:16:23Z


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record