skip to main content
10.1145/1755688.1755732acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Apex: extending Android permission model and enforcement with user-defined runtime constraints

Published:13 April 2010Publication History

ABSTRACT

Android is the first mass-produced consumer-market open source mobile platform that allows developers to easily create applications and users to readily install them. However, giving users the ability to install third-party applications poses serious security concerns. While the existing security mechanism in Android allows a mobile phone user to see which resources an application requires, she has no choice but to allow access to all the requested permissions if she wishes to use the applications. There is no way of granting some permissions and denying others. Moreover, there is no way of restricting the usage of resources based on runtime constraints such as the location of the device or the number of times a resource has been previously used. In this paper, we present Apex -- a policy enforcement framework for Android that allows a user to selectively grant permissions to applications as well as impose constraints on the usage of resources. We also describe an extended package installer that allows the user to set these constraints through an easy-to-use interface. Our enforcement framework is implemented through a minimal change to the existing Android code base and is backward compatible with the current security mechanism.

References

  1. William Enck, Machigar Ongtang, and Patrick McDaniel. On lightweight mobile phone application certification. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 235--245, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Adam P. Fuchs, Avik Chaudhuri, and Jeffrey S. Foster. SCanDroid: Automated Security Certification of Android Applications. In Submitted to IEEE S&P'10: Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010.Google ScholarGoogle Scholar
  3. Google. Android Home Page, 2009. Available at: http://www.android.com.Google ScholarGoogle Scholar
  4. Google. Android Reference: Intent, 2009. Available at: http://developer.android.com/reference/android/content/Intent.html.Google ScholarGoogle Scholar
  5. Google. Android Reference: Manifest File - Permissions, 2009. Available at: http://developer.android.com/guide/topics/manifest/manifest-intro.html\#perms.Google ScholarGoogle Scholar
  6. Google. Android Reference: Security and Permissions, 2009. Available at: http://developer.android.com/guide/topics/security/security.html.Google ScholarGoogle Scholar
  7. M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically Rich Application-Centric Security in Android. In Proceedings of the Annual Computer Security Applications Conference, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Apex: extending Android permission model and enforcement with user-defined runtime constraints

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIACCS '10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
        April 2010
        363 pages
        ISBN:9781605589367
        DOI:10.1145/1755688

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 April 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        ASIACCS '10 Paper Acceptance Rate25of166submissions,15%Overall Acceptance Rate418of2,322submissions,18%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader