A software environment for confining malicious android applications via resource virtualization

Xiaolei Li, Guangdong Bai, Zhenkai Liang, Heng Yin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

In the Android system, applications (apps) execute on the same platform that manages all system resources, where resource accesses are regulated through a permission-based mechanism. As a result, malicious apps get chances to abuse resources that are available on the Android platform. In this paper, we propose resource virtualization as a security mechanism to confine resource-abusing Android apps. The physical resources on a mobile device are virtualized to a different virtual view for selected Android apps. Resource virtualization simulates a partial but consistent virtual view of the Android resources. Therefore, it can not only confine the resource-abusing apps effectively, but also ensure the usability of them. We implement a system prototype, RVDroid, and evaluate it with real-world apps of various types. Our results demonstrate its effectiveness on malicious Android apps and its compatibility and usability on benign ones.

Original languageEnglish (US)
Title of host publicationProceedings - 2013 International Conference on Engineering of Complex Computer Systems, ICECCS 2013
Pages208-211
Number of pages4
DOIs
StatePublished - Oct 15 2013
Event18th International Conference on Engineering of Complex Computer Systems, ICECCS 2013 - Singapore, Singapore
Duration: Jul 17 2013Jul 19 2013

Publication series

NameProceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS

Other

Other18th International Conference on Engineering of Complex Computer Systems, ICECCS 2013
CountrySingapore
CitySingapore
Period7/17/137/19/13

Keywords

  • Android malware
  • isolation
  • mobile security

ASJC Scopus subject areas

  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'A software environment for confining malicious android applications via resource virtualization'. Together they form a unique fingerprint.

  • Cite this

    Li, X., Bai, G., Liang, Z., & Yin, H. (2013). A software environment for confining malicious android applications via resource virtualization. In Proceedings - 2013 International Conference on Engineering of Complex Computer Systems, ICECCS 2013 (pp. 208-211). [6601825] (Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS). https://doi.org/10.1109/ICECCS.2013.38