A software environment for confining malicious android applications via resource virtualization

Xiaolei Li, Guangdong Bai, Zhenkai Liang, Heng Yin

Research output: Chapter in Book/Entry/PoemConference contribution

1 Scopus citations

Abstract

In the Android system, applications (apps) execute on the same platform that manages all system resources, where resource accesses are regulated through a permission-based mechanism. As a result, malicious apps get chances to abuse resources that are available on the Android platform. In this paper, we propose resource virtualization as a security mechanism to confine resource-abusing Android apps. The physical resources on a mobile device are virtualized to a different virtual view for selected Android apps. Resource virtualization simulates a partial but consistent virtual view of the Android resources. Therefore, it can not only confine the resource-abusing apps effectively, but also ensure the usability of them. We implement a system prototype, RVDroid, and evaluate it with real-world apps of various types. Our results demonstrate its effectiveness on malicious Android apps and its compatibility and usability on benign ones.

Original languageEnglish (US)
Title of host publicationProceedings - 2013 International Conference on Engineering of Complex Computer Systems, ICECCS 2013
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages208-211
Number of pages4
ISBN (Print)9780769550077
DOIs
StatePublished - 2013
Event18th International Conference on Engineering of Complex Computer Systems, ICECCS 2013 - Singapore, Singapore
Duration: Jul 17 2013Jul 19 2013

Publication series

NameProceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS
ISSN (Print)2770-8527
ISSN (Electronic)2770-8535

Other

Other18th International Conference on Engineering of Complex Computer Systems, ICECCS 2013
Country/TerritorySingapore
CitySingapore
Period7/17/137/19/13

Keywords

  • Android malware
  • isolation
  • mobile security

ASJC Scopus subject areas

  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A software environment for confining malicious android applications via resource virtualization'. Together they form a unique fingerprint.

Cite this