TY - GEN
T1 - A light-weight software environment for confining android malware
AU - Li, Xiaolei
AU - Bai, Guangdong
AU - Thian, Benjamin
AU - Liang, Zhenkai
AU - Yin, Heng
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/9/17
Y1 - 2014/9/17
N2 - Mobile devices are becoming increasingly general-purpose, and therefore the physical boundary used to separate important resources disappears. As a result, malicious applications (apps) get chances to abuse resources that are available on the mobile platform. In this paper, we propose resource virtualization as a security mechanism for the Android system to strengthen the physical barrier between many types of resources and confine resource-abusing Android apps. The physical resources on a mobile device are virtualized to a different virtual view for selected Android apps. Resource virtualization simulates a partial but consistent virtual view of the Android resources. Therefore, it can not only confine the resource-abusing apps effectively, but also ensure the usability of these apps. We implement a system prototype, RVL, and evaluate it with real-world apps of various types. Our results demonstrate its effectiveness on malicious Android apps and its compatibility and usability on benign Android apps.
AB - Mobile devices are becoming increasingly general-purpose, and therefore the physical boundary used to separate important resources disappears. As a result, malicious applications (apps) get chances to abuse resources that are available on the mobile platform. In this paper, we propose resource virtualization as a security mechanism for the Android system to strengthen the physical barrier between many types of resources and confine resource-abusing Android apps. The physical resources on a mobile device are virtualized to a different virtual view for selected Android apps. Resource virtualization simulates a partial but consistent virtual view of the Android resources. Therefore, it can not only confine the resource-abusing apps effectively, but also ensure the usability of these apps. We implement a system prototype, RVL, and evaluate it with real-world apps of various types. Our results demonstrate its effectiveness on malicious Android apps and its compatibility and usability on benign Android apps.
KW - Android malware
KW - isolation
KW - mobile security
UR - http://www.scopus.com/inward/record.url?scp=84908658534&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84908658534&partnerID=8YFLogxK
U2 - 10.1109/SERE-C.2014.34
DO - 10.1109/SERE-C.2014.34
M3 - Conference contribution
AN - SCOPUS:84908658534
T3 - Proceedings - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014
SP - 158
EP - 167
BT - Proceedings - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014
Y2 - 30 June 2014 through 2 July 2014
ER -