Abstract

We introduce Kynoid, a real-time monitoring and enforcement framework for Android. Kynoid is based on user-defined security policies which are defined for data-items. This allows users to define temporal, spatial, and destination constraints which have to hold for single items. We introduce an innovative approach to allow for the real-time tracking and enforcement of such policies. In this way, Kynoid is the first extension for Android which enables the enforcement of security policies of data-items stored in shared resources. We outline Kynoid's architecture, present its operation and discuss it in terms of applicability, and performance. By providing a proof-of-concept implementation we further show the feasibility of our framework.

Highlights

  • The distribution of Smartphones to employees becomes more and more interesting for companies

  • The tracking of security related information in Android was limited to taint tags

  • TaintDroid is limited to a set of at most 32 different data sources

Read more

Summary

Introduction

The distribution of Smartphones to employees becomes more and more interesting for companies They enable unified and simplified communication as well as permanent reachability. These companies tend to weaken their traditional security requirements by weakening guidelines and restrictions on these devices to avoid that users replace their business Smartphone and use other means of communication for private purposes. Modern platforms have seen a tremendous increase in innovative applications. They provide easy access to web and cloud services and support the user in their daily activities. This trend is enforced by simple and handy APIs which inspire private application developers. Application markets have become very popular from a developer as well as from a consumer perspective

Information Processing in Today’s Smart-Phones
Contribution
Background
Dalvik Virtual Machine
Security Architecture
Security Issues and Deficiencies
TaintDroid
Approach Overview
Kynoid
Framework Operation
Source Policy 2 Source Policy 3 Source Policy
Policy Propagation
Inter-Process Policy Tracking
Policy Derivation and Enforcement
Applicability
Performance
Usability
Related Work
Conclusions and Future Work
11. Microsoft Corporation
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.