DyPolDroid: Protecting Against Permission-Abuse Attacks in Android
Carlos E. Rubio-Medrano (),
Pradeep Kumar Duraisamy Soundrapandian,
Matthew Hill,
Luis Claramunt,
Jaejong Baek,
Geetha S and
Gail-Joon Ahn
Additional contact information
Carlos E. Rubio-Medrano: Texas A&M University - Corpus Christi
Pradeep Kumar Duraisamy Soundrapandian: VIT
Luis Claramunt: Arizona State University
Jaejong Baek: Arizona State University
Geetha S: VIT
Gail-Joon Ahn: Arizona State University
Information Systems Frontiers, 2023, vol. 25, issue 2, No 7, 529-548
Abstract:
Abstract Android applications are extremely popular, as they are widely used for banking, social media, e-commerce, etc. Such applications typically leverage a series of Permissions, which serve as a convenient abstraction for mediating access to security-sensitive functionality within the Android Ecosystem, e.g., sending data over the Internet. However, several malicious applications have recently deployed attacks such as data leaks and spurious credit card charges by abusing the Permissions granted initially to them by unaware users in good faith. To alleviate this pressing concern, we present DyPolDroid, a dynamic and semi-automated security framework that builds upon Android Enterprise, a device-management framework for organizations, to allow for users and administrators to design and enforce so-called Counter-Policies, a convenient user-friendly abstraction to restrict the sets of Permissions granted to potential malicious applications, thus effectively protecting against serious attacks without requiring advanced security and technical expertise. Additionally, as a part of our experimental procedures, we introduce Laverna, a fully operational application that uses permissions to provide benign functionality at the same time it also abuses them for malicious purposes. To fully support the reproducibility of our results, and to encourage future work, the source code of both DyPolDroid and Laverna is publicly available as open-source.
Keywords: Permission-abuse attacks; Access control; Android enterprise (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations: View citations in EconPapers (1)
Downloads: (external link)
http://link.springer.com/10.1007/s10796-022-10328-8 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:infosf:v:25:y:2023:i:2:d:10.1007_s10796-022-10328-8
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/10796
DOI: 10.1007/s10796-022-10328-8
Access Statistics for this article
Information Systems Frontiers is currently edited by Ram Ramesh and Raghav Rao
More articles in Information Systems Frontiers from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().