移动安全和隐私:对强大访问控制的追求

A. Sadeghi
{"title":"移动安全和隐私:对强大访问控制的追求","authors":"A. Sadeghi","doi":"10.1145/2462410.2463204","DOIUrl":null,"url":null,"abstract":"Mobile smart devices are changing our lives and are the emerging dominant computing platform for end-users. Mobile applications (apps) provide flexible access to critical services such as online banking, health records, enterprise applications, or social networks. The increasing computing and storage capabilities, new interfaces such as near field communication technology (NFC) or integration of hardware-based secure execution environments as well as rich context sensing capabilities have turned these devices to enablers for many useful (and fancy) applications. In particular, we consider two emerging trends with high commercial interest: smart devices as access tokens (e.g., in conjunction with NFC), and smart devices as powerful sensors for context-aware access control to resources. We elaborate on the functional, security, and privacy challenges to realizing these applications in practice. To tackle these challenges (and depending on the underlying use-case) we clearly need security and privacy protecting measures at different system abstraction layers (applications, operating system, and hardware) and we may need them simultaneously. Although mobile operating systems have been designed with security in mind from their infancy, they fail to resist sophisticated attacks as shown recently. We observe diverse attack vectors from application-level privilege escalation attacks and sensory malware to runtime attacks that hijack the execution flow of apps, in particular the recently proposed just-in-time return-oriented programming attack technique which circumvents fine-grained address space layout randomization. Moreover, runtime attacks can be leveraged to compromise the underlying operating system through kernel based attacks (e.g., root exploits) allowing an attacker to get full control over the mobile device.\n In the recent years, researchers have presented many proposals to enhance the security and privacy at different abstraction layers with the strong focus on the Android operating system for obvious reasons (open-source and popularity). Investigating the large body of literature on Android security we observe that almost all proposals for security extensions to Android constitute mandatory access control (MAC) mechanisms that are tailored to the specific semantics of the addressed problem, for instance, establishing fine-grained access control to the user's private data or protecting the platform integrity.\n Moreover, these solutions consider protection mechanisms that operate only at a specific system abstraction layer, i.e., either at the middleware (and/or application) layer, or at the kernel-layer. In addition, security and privacy policy management itself would need to be made more context-aware and user-centric.\n We elaborate on security solutions (including our work) that aim to mitigate attacks at application-level including control flow integrity (CFI) against runtime attacks on mobile devices, and discuss their trade-offs. We then present a generic security architecture - inspired by concepts of the Flask architecture - for the Android OS which covers mandatory access control (MAC) on both the kernel- and middleware layers. It aims to serve as a flexible and effective ecosystem to instantiate different security solutions. Moreover, it aims at enforcing sensing- and context-based policies, e.g., using sensed contexts and their security-relevant properties to grant and deny access to device resources dynamically, in a truly context-aware manner. We then discuss further challenges in particular for deployment in practice \n Last but not least we leave the question open, how mighty the access control mechanisms should be on mobile smart devices to have an appropriate and reasonable trade-off of security, privacy and usability in practice.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"40 1","pages":"1-2"},"PeriodicalIF":0.0000,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Mobile security and privacy: the quest for the mighty access control\",\"authors\":\"A. Sadeghi\",\"doi\":\"10.1145/2462410.2463204\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile smart devices are changing our lives and are the emerging dominant computing platform for end-users. Mobile applications (apps) provide flexible access to critical services such as online banking, health records, enterprise applications, or social networks. The increasing computing and storage capabilities, new interfaces such as near field communication technology (NFC) or integration of hardware-based secure execution environments as well as rich context sensing capabilities have turned these devices to enablers for many useful (and fancy) applications. In particular, we consider two emerging trends with high commercial interest: smart devices as access tokens (e.g., in conjunction with NFC), and smart devices as powerful sensors for context-aware access control to resources. We elaborate on the functional, security, and privacy challenges to realizing these applications in practice. To tackle these challenges (and depending on the underlying use-case) we clearly need security and privacy protecting measures at different system abstraction layers (applications, operating system, and hardware) and we may need them simultaneously. Although mobile operating systems have been designed with security in mind from their infancy, they fail to resist sophisticated attacks as shown recently. We observe diverse attack vectors from application-level privilege escalation attacks and sensory malware to runtime attacks that hijack the execution flow of apps, in particular the recently proposed just-in-time return-oriented programming attack technique which circumvents fine-grained address space layout randomization. Moreover, runtime attacks can be leveraged to compromise the underlying operating system through kernel based attacks (e.g., root exploits) allowing an attacker to get full control over the mobile device.\\n In the recent years, researchers have presented many proposals to enhance the security and privacy at different abstraction layers with the strong focus on the Android operating system for obvious reasons (open-source and popularity). Investigating the large body of literature on Android security we observe that almost all proposals for security extensions to Android constitute mandatory access control (MAC) mechanisms that are tailored to the specific semantics of the addressed problem, for instance, establishing fine-grained access control to the user's private data or protecting the platform integrity.\\n Moreover, these solutions consider protection mechanisms that operate only at a specific system abstraction layer, i.e., either at the middleware (and/or application) layer, or at the kernel-layer. In addition, security and privacy policy management itself would need to be made more context-aware and user-centric.\\n We elaborate on security solutions (including our work) that aim to mitigate attacks at application-level including control flow integrity (CFI) against runtime attacks on mobile devices, and discuss their trade-offs. We then present a generic security architecture - inspired by concepts of the Flask architecture - for the Android OS which covers mandatory access control (MAC) on both the kernel- and middleware layers. It aims to serve as a flexible and effective ecosystem to instantiate different security solutions. Moreover, it aims at enforcing sensing- and context-based policies, e.g., using sensed contexts and their security-relevant properties to grant and deny access to device resources dynamically, in a truly context-aware manner. We then discuss further challenges in particular for deployment in practice \\n Last but not least we leave the question open, how mighty the access control mechanisms should be on mobile smart devices to have an appropriate and reasonable trade-off of security, privacy and usability in practice.\",\"PeriodicalId\":74509,\"journal\":{\"name\":\"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies\",\"volume\":\"40 1\",\"pages\":\"1-2\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2462410.2463204\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2462410.2463204","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

移动智能设备正在改变我们的生活,是终端用户新兴的主要计算平台。移动应用程序(app)提供对关键服务的灵活访问,如网上银行、健康记录、企业应用程序或社交网络。不断增长的计算和存储能力、新接口(如近场通信技术(NFC))或基于硬件的安全执行环境集成以及丰富的上下文感知能力)使这些设备成为许多有用(和奇特)应用程序的推动者。特别是,我们考虑了两个具有高商业兴趣的新兴趋势:智能设备作为访问令牌(例如,与NFC结合使用),智能设备作为对资源进行上下文感知访问控制的强大传感器。我们详细阐述了在实践中实现这些应用程序所面临的功能、安全和隐私方面的挑战。为了应对这些挑战(并取决于底层用例),我们显然需要在不同的系统抽象层(应用程序、操作系统和硬件)上采取安全和隐私保护措施,我们可能同时需要它们。尽管移动操作系统在设计之初就考虑到了安全性,但正如最近所示,它们无法抵御复杂的攻击。我们观察到各种攻击向量,从应用程序级特权升级攻击和感知恶意软件到劫持应用程序执行流的运行时攻击,特别是最近提出的即时返回导向编程攻击技术,它绕过了细粒度地址空间布局随机化。此外,运行时攻击可以通过基于内核的攻击(例如,根漏洞利用)来危害底层操作系统,从而允许攻击者完全控制移动设备。近年来,研究人员提出了许多在不同抽象层增强安全性和隐私性的建议,其中重点关注Android操作系统,原因很明显(开源和流行)。调查大量关于Android安全的文献,我们发现几乎所有关于Android安全扩展的建议都包含强制访问控制(MAC)机制,这些机制是针对所解决问题的特定语义量身定制的,例如,建立对用户私有数据的细粒度访问控制或保护平台完整性。此外,这些解决方案考虑了仅在特定系统抽象层(即中间件(和/或应用程序)层或内核层)上运行的保护机制。此外,安全和隐私策略管理本身需要更加上下文感知和以用户为中心。我们详细阐述了旨在减轻应用级攻击的安全解决方案(包括我们的工作),包括针对移动设备运行时攻击的控制流完整性(CFI),并讨论了它们的权衡。然后,我们提出了一个通用的安全架构——受到Flask架构概念的启发——用于Android操作系统,它涵盖了内核层和中间件层的强制访问控制(MAC)。它旨在作为一个灵活有效的生态系统来实例化不同的安全解决方案。此外,它旨在实施基于感知和上下文的策略,例如,使用感知上下文及其安全相关属性,以真正的上下文感知方式动态授予和拒绝对设备资源的访问。然后我们讨论进一步的挑战,特别是在实践中部署最后但并非最不重要的是,我们留下的问题是,如何强大的访问控制机制应该在移动智能设备上有一个适当的和合理的权衡安全,隐私和可用性在实践中。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Mobile security and privacy: the quest for the mighty access control
Mobile smart devices are changing our lives and are the emerging dominant computing platform for end-users. Mobile applications (apps) provide flexible access to critical services such as online banking, health records, enterprise applications, or social networks. The increasing computing and storage capabilities, new interfaces such as near field communication technology (NFC) or integration of hardware-based secure execution environments as well as rich context sensing capabilities have turned these devices to enablers for many useful (and fancy) applications. In particular, we consider two emerging trends with high commercial interest: smart devices as access tokens (e.g., in conjunction with NFC), and smart devices as powerful sensors for context-aware access control to resources. We elaborate on the functional, security, and privacy challenges to realizing these applications in practice. To tackle these challenges (and depending on the underlying use-case) we clearly need security and privacy protecting measures at different system abstraction layers (applications, operating system, and hardware) and we may need them simultaneously. Although mobile operating systems have been designed with security in mind from their infancy, they fail to resist sophisticated attacks as shown recently. We observe diverse attack vectors from application-level privilege escalation attacks and sensory malware to runtime attacks that hijack the execution flow of apps, in particular the recently proposed just-in-time return-oriented programming attack technique which circumvents fine-grained address space layout randomization. Moreover, runtime attacks can be leveraged to compromise the underlying operating system through kernel based attacks (e.g., root exploits) allowing an attacker to get full control over the mobile device. In the recent years, researchers have presented many proposals to enhance the security and privacy at different abstraction layers with the strong focus on the Android operating system for obvious reasons (open-source and popularity). Investigating the large body of literature on Android security we observe that almost all proposals for security extensions to Android constitute mandatory access control (MAC) mechanisms that are tailored to the specific semantics of the addressed problem, for instance, establishing fine-grained access control to the user's private data or protecting the platform integrity. Moreover, these solutions consider protection mechanisms that operate only at a specific system abstraction layer, i.e., either at the middleware (and/or application) layer, or at the kernel-layer. In addition, security and privacy policy management itself would need to be made more context-aware and user-centric. We elaborate on security solutions (including our work) that aim to mitigate attacks at application-level including control flow integrity (CFI) against runtime attacks on mobile devices, and discuss their trade-offs. We then present a generic security architecture - inspired by concepts of the Flask architecture - for the Android OS which covers mandatory access control (MAC) on both the kernel- and middleware layers. It aims to serve as a flexible and effective ecosystem to instantiate different security solutions. Moreover, it aims at enforcing sensing- and context-based policies, e.g., using sensed contexts and their security-relevant properties to grant and deny access to device resources dynamically, in a truly context-aware manner. We then discuss further challenges in particular for deployment in practice Last but not least we leave the question open, how mighty the access control mechanisms should be on mobile smart devices to have an appropriate and reasonable trade-off of security, privacy and usability in practice.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信