skip to main content
10.1145/2523649.2523676acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

DR BACA: dynamic role based access control for Android

Published:09 December 2013Publication History

ABSTRACT

Android as an open platform dominates the booming mobile market. However its permission mechanism is inflexible and often results in over-privileged applications. This in turn creates severe security issues. Aiming to support the Principle of Least Privilege, we propose and implement a Dynamic Role Based Access Control for Android (DR BACA) model to enhance Android security, particularly in corporate environment. Our system offers multi-user management on Android mobile devices comparable to traditional workstations, and provides fine-grained Role Based Access Control (RBAC) to enhance Android security at both the application and permission level. Moreover, by leveraging context-aware capabilities of mobile devices and Near Field communication (NFC) technology, our solution supports dynamic RBAC to provide more flexible access control while still being able to mitigate some of the most serious security risks on mobile devices. The DR BACA system can easily be managed, even in large business environments with many mobile devices. We show that our DR BACA system can be deployed and used with ease. With a proper security policy, our evaluation shows that DR BACA can effectively mitigate the security risks posed by both malicious and vulnerable non-malicious applications while incurring only a small overall system overhead.

References

  1. M. Ballano. Android.mobiletx. http://www.symantec.com/security\_response/writeup.jsp?docid=2012-052807-4439-99, 2012.Google ScholarGoogle Scholar
  2. S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A.-R. Sadeghi. Xmandroid: A new android evolution to mitigate privilege escalation attacks. Technical Report TR-2011-04, Technische Universität Darmstadt, Apr 2011.Google ScholarGoogle Scholar
  3. S. Bugiel, L. Davi, A. Dmitrienko, S. Heuser, A.-R. Sadeghi, and B. Shastry. Practical and lightweight domain isolation on android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pages 51--62, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. B. Cai. Android.jifake. http://www.symantec.com/security\_response/writeup.jsp?docid=2012-073021-4247-99, 2012.Google ScholarGoogle Scholar
  5. L. Chen and J. Crampton. Inter-domain role mapping and least privilege. In Proceedings of the 12th ACM symposium on Access control models and technologies, pages 157--162. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Conti, V. Nguyen, and B. Crispo. Crepe: context-related policy enforcement for android. 2011.Google ScholarGoogle Scholar
  7. W. Enck, M. Ongtang, and P. McDaniel. Understanding android security. IEEE Security & Privacy Magazine, 7(1):50--57, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Felt, H. Wang, and A. Moshchuk. Permission re-delegation: Attacks and defenses. In USENIX, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Ferraiolo and R. Kuhn. Role-based access control. In In 15th NIST-NCSC National Computer Security Conference, pages 554--563, 1992.Google ScholarGoogle Scholar
  10. Gartner. Smartphone sales increased 47 percent. http://www.gartner.com/newsroom/id/2237315, Nov. 2012.Google ScholarGoogle Scholar
  11. Google. Jelly bean. http://developer.android.com/about/versions/jelly-bean.html, 2012.Google ScholarGoogle Scholar
  12. Google. Manifest.permission. http://developer.android.com/reference/android/Manifest.permission.html, 2013.Google ScholarGoogle Scholar
  13. Google. Signing your applications. http://developer.android.com/tools/publishing/app-signing.html, 2013.Google ScholarGoogle Scholar
  14. R. J. Hulsebosch, A. H. Salden, M. S. Bargh, P. W. G. Ebben, and J. Reitsma. Context sensitive access control. In Proceedings of the tenth ACM symposium on Access control models and technologies, SACMAT '05, pages 111--119, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. McAfee-Labs. Mcafee threats report: Second quarter 2012. Technical report, 2012.Google ScholarGoogle Scholar
  16. R. B. Miller. Response time in man-computer conversational transactions. In Proceedings of the December 9-11, 1968, fall joint computer conference, part I, AFIPS '68 (Fall, part I), pages 267--277, New York, NY, USA, 1968. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Narayanan and M. Gunes. Ensuring access control in cloud provisioned healthcare systems. In Consumer Communications and Networking Conference (CCNC), 2011 IEEE, pages 247--251, jan. 2011.Google ScholarGoogle ScholarCross RefCross Ref
  18. M. Nauman, S. Khan, and X. Zhang. Apex: extending android permission model and enforcement with user-defined runtime constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pages 328--332, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Nielsen. Usability Engineering. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. U. D. of Health & Human Services. Your medical records. http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/medicalrecords.html, 2013.Google ScholarGoogle Scholar
  21. M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in android. Journal of Security and Communication Network, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. E. Protalinski. New android malware uses google play icon to trick users, conduct ddos attacks and send spam texts. http://thenextweb.com/google/2012/12/27/new-android-malware-uses-google-play-icon-to-trick-users-conduct-ddos-attacks-and-send-spam-texts/, 2012.Google ScholarGoogle Scholar
  23. N. Provos, M. Friedl, and P. Honeyman. Preventing privilege escalation. In Proceedings of the 12th USENIX Security Symposium, volume 12, pages 231--242, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. F. Rohrer. DR BACA: Dynamic role based access control for android. Master's thesis, Boston University Metropolitan College, 2013. Pending publication.Google ScholarGoogle Scholar
  25. F. Ruiz. 'Fakeinstaller' leads the attack on android phones. http://blogs.mcafee.com/mcafee-labs/fakeinstaller-leads-the-attack-on-android-phones, 2012.Google ScholarGoogle Scholar
  26. A. Saita. Mobile malware dubbed 'bill shocker' targets chinese android users. http://threatpost.com/en\_us/blogs/mobile-malware-dubbed-bill-shocker-targets-chinese-android-users-013013, 2013.Google ScholarGoogle Scholar
  27. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. Computer, 29(2):38--47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. S. Sandhu and P. Samarati. Access control: principle and practice. Communications Magazine, IEEE, 32(9):40--48, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Shabtai, Y. Fledel, and Y. Elovici. Securing android-powered mobile devices using selinux. IEEE Security and Privacy, 8:36--44, May 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. B. Shneiderman. Response time and display rate in human performance with computers. ACM Computing Surveys, 16(3):265--285, Sept. 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Yamamoto. Android.ackposts. http://www.symantec.com/security\_response/writeup.jsp?docid=2012-072302-3943-99, 2012.Google ScholarGoogle Scholar
  32. A. Yamamoto. Android.enesoluty. http://www.symantec.com/security\_response/writeup.jsp?docid=2012-090607-0807-99, 2012.Google ScholarGoogle Scholar
  33. T. T. W. Yee and N. Thein. Leveraging access control mechanism of android smartphone using context-related role-based access control model. In Networked Computing and Advanced Information Management (NCM), 2011 7th International Conference on, pages 54--61, june 2011.Google ScholarGoogle Scholar

Index Terms

  1. DR BACA: dynamic role based access control for Android

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference
      December 2013
      374 pages
      ISBN:9781450320153
      DOI:10.1145/2523649

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 December 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate104of497submissions,21%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader