TY - GEN
T1 - A software environment for confining malicious android applications via resource virtualization
AU - Li, Xiaolei
AU - Bai, Guangdong
AU - Liang, Zhenkai
AU - Yin, Heng
N1 - Copyright:
Copyright 2013 Elsevier B.V., All rights reserved.
PY - 2013
Y1 - 2013
N2 - In the Android system, applications (apps) execute on the same platform that manages all system resources, where resource accesses are regulated through a permission-based mechanism. As a result, malicious apps get chances to abuse resources that are available on the Android platform. In this paper, we propose resource virtualization as a security mechanism to confine resource-abusing Android apps. The physical resources on a mobile device are virtualized to a different virtual view for selected Android apps. Resource virtualization simulates a partial but consistent virtual view of the Android resources. Therefore, it can not only confine the resource-abusing apps effectively, but also ensure the usability of them. We implement a system prototype, RVDroid, and evaluate it with real-world apps of various types. Our results demonstrate its effectiveness on malicious Android apps and its compatibility and usability on benign ones.
AB - In the Android system, applications (apps) execute on the same platform that manages all system resources, where resource accesses are regulated through a permission-based mechanism. As a result, malicious apps get chances to abuse resources that are available on the Android platform. In this paper, we propose resource virtualization as a security mechanism to confine resource-abusing Android apps. The physical resources on a mobile device are virtualized to a different virtual view for selected Android apps. Resource virtualization simulates a partial but consistent virtual view of the Android resources. Therefore, it can not only confine the resource-abusing apps effectively, but also ensure the usability of them. We implement a system prototype, RVDroid, and evaluate it with real-world apps of various types. Our results demonstrate its effectiveness on malicious Android apps and its compatibility and usability on benign ones.
KW - Android malware
KW - isolation
KW - mobile security
UR - http://www.scopus.com/inward/record.url?scp=84885209656&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84885209656&partnerID=8YFLogxK
U2 - 10.1109/ICECCS.2013.38
DO - 10.1109/ICECCS.2013.38
M3 - Conference contribution
AN - SCOPUS:84885209656
SN - 9780769550077
T3 - Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS
SP - 208
EP - 211
BT - Proceedings - 2013 International Conference on Engineering of Complex Computer Systems, ICECCS 2013
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 18th International Conference on Engineering of Complex Computer Systems, ICECCS 2013
Y2 - 17 July 2013 through 19 July 2013
ER -