skip to main content
10.1145/1554339.1554341acmconferencesArticle/Chapter ViewAbstractPublication PagespldiConference Proceedingsconference-collections
research-article

Language-based security on Android

Published: 15 June 2009 Publication History

Abstract

In this paper, we initiate a formal study of security on Android: Google's new open-source platform for mobile devices. Specifically, we present a core typed language to describe Android applications, and to reason about their data-flow security properties. Our operational semantics and type system provide some necessary foundations to help both users and developers of Android applications deal with their security concerns.

References

[1]
Android developers. http://developer.android.com/index.html.
[2]
Android market. http://www.android.com/market/.
[3]
Android project. http://source.android.com/.
[4]
The Jif project. http://www.cs.cornell.edu/jif/.
[5]
The Mobius project. http://mobius.inria.fr/twiki/bin/view/Mobius.
[6]
The S3MS project. http://www.s3ms.org/index.jsp.
[7]
WALA. http://wala.sourceforge.net/wiki/index.php/Main_Page.
[8]
A. Chaudhuri, P. Naldurg, and S. Rajamani. A type system for data-flow integrity on Windows Vista. In PLAS'08: Programming Languages and Analysis for Security, pages 89--100. ACM, 2008.
[9]
W. Enck, M. Ongtang, and P. McDaniel. Understanding Android security. IEEE Security & Privacy Magazine, 7(1):10--17, 2009.
[10]
C. Flanagan, K. R. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, and R. Stata. Extended static checking for Java. In PLDI'02: Programming Language Design and Implementation, pages 234--245. ACM, 2002.
[11]
G. C. Necula. Proof-carrying code. In POPL'97: Principles of Programming Langauges, pages 106--119. ACM, 1997.
[12]
R. V. Rai. Soot: A Java bytecode optimization framework. Master's thesis, McGill University, 2000.

Cited By

View all
  • (2024)TPAM: Timed-Permission based Access Control Analysis and Modeling Method for Android AppsProceedings of the 2024 6th International Conference on Software Engineering and Development10.1145/3686614.3686618(30-38)Online publication date: 29-May-2024
  • (2024)TySA: Enforcing Security Policies for Safeguarding Against Permission-Induced Attacks in Android ApplicationsIEEE Access10.1109/ACCESS.2024.348785212(165026-165041)Online publication date: 2024
  • (2022)A Formal Method for Description and Decision of Android Apps Behavior Based on Process AlgebraIEEE Access10.1109/ACCESS.2022.321038610(108668-108683)Online publication date: 2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PLAS '09: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security
June 2009
130 pages
ISBN:9781605586458
DOI:10.1145/1554339
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 June 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. certified compilation
  2. data-flow security
  3. hybrid type system
  4. mobile code

Qualifiers

  • Research-article

Funding Sources

Conference

PLDI '09
Sponsor:

Acceptance Rates

PLAS '09 Paper Acceptance Rate 8 of 19 submissions, 42%;
Overall Acceptance Rate 43 of 77 submissions, 56%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)1
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)TPAM: Timed-Permission based Access Control Analysis and Modeling Method for Android AppsProceedings of the 2024 6th International Conference on Software Engineering and Development10.1145/3686614.3686618(30-38)Online publication date: 29-May-2024
  • (2024)TySA: Enforcing Security Policies for Safeguarding Against Permission-Induced Attacks in Android ApplicationsIEEE Access10.1109/ACCESS.2024.348785212(165026-165041)Online publication date: 2024
  • (2022)A Formal Method for Description and Decision of Android Apps Behavior Based on Process AlgebraIEEE Access10.1109/ACCESS.2022.321038610(108668-108683)Online publication date: 2022
  • (2021)Android Application SecurityResearch Anthology on Securing Mobile Technologies and Applications10.4018/978-1-7998-8545-0.ch034(610-625)Online publication date: 2021
  • (2021)A permission-dependent type system for secure information flow analysisJournal of Computer Security10.3233/JCS-200036(1-68)Online publication date: 17-Feb-2021
  • (2021)Flair: efficient analysis of Android inter-component vulnerabilities in response to incremental changesEmpirical Software Engineering10.1007/s10664-020-09932-626:3Online publication date: 9-Apr-2021
  • (2020)Smali+: An Operational Semantics for Low-Level Code Generated from Reverse Engineering Android ApplicationsInformation10.3390/info1103013011:3(130)Online publication date: 27-Feb-2020
  • (2020)Heap Memory Snapshot Assisted Program Analysis for Android Permission Specification2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)10.1109/SANER48275.2020.9054795(435-446)Online publication date: Feb-2020
  • (2019)Android Application SecurityApplying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism10.4018/978-1-5225-8976-1.ch002(46-67)Online publication date: 2019
  • (2019)Formal Analysis of Language-Based Android Security Using Theorem Proving ApproachIEEE Access10.1109/ACCESS.2019.28952617(16550-16560)Online publication date: 2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media