Publication | Closed Access
Apex
532
Citations
11
References
2010
Year
Unknown Venue
Hardware SecurityMobile SecuritySoftware SecurityEngineeringInformation SecurityAndroid Code BaseOperating System SecuritySecure By DesignMobile MalwareMobile ComputingExtended Package InstallerPolicy Enforcement FrameworkData SecurityCryptography
Android is the first mass‑produced consumer‑market open‑source mobile platform that lets developers create apps and users install them, but it lacks fine‑grained permission control and runtime resource restrictions, raising security concerns. The paper introduces Apex, a policy enforcement framework that lets users selectively grant permissions and impose usage constraints on Android applications. Apex is implemented with minimal changes to Android’s code base, is backward compatible, and includes an extended package installer that lets users set constraints via an easy‑to‑use interface.
Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giving users the ability to install third-party applications poses serious security concerns. While the existing security mechanism in Android allows a mobile phone user to see which resources an application requires, she has no choice but to allow access to all the requested permissions if she wishes to use the applications. There is no way of granting some permissions and denying others. Moreover, there is no way of restricting the usage of resources based on runtime constraints such as the location of the device or the number of times a resource has been previously used. In this paper, we present Apex -- a policy enforcement framework for Android that allows a user to selectively grant permissions to applications as well as impose constraints on the usage of resources. We also describe an extended package installer that allows the user to set these constraints through an easy-to-use interface. Our enforcement framework is implemented through a minimal change to the existing Android code base and is backward compatible with the current security mechanism.
| Year | Citations | |
|---|---|---|
Page 1
Page 1