首页> 外文会议>Information security >Privilege Escalation Attacks on Android
【24h】

Privilege Escalation Attacks on Android

机译:Android上的特权升级攻击

获取原文
获取原文并翻译 | 示例

摘要

Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model which is based on application-oriented mandatory access control and sandboxing. This allows developers and users to restrict the execution of an application to the privileges it has (mandatorily) assigned at installation time. The exploitation of vulnerabilities in program code is hence believed to be confined within the privilege boundaries of an application's sandbox. However, in this paper we show that a privilege escalation attack is possible. We show that a genuine application exploited at runtime or a malicious application can escalate granted permissions. Our results immediately imply that Android's security model cannot deal with a transitive permission usage attack and Android's sandbox model fails as a last resort against malware and sophisticated runtime attacks.
机译:Android是适用于智能手机的现代流行软件平台。它的主要功能之一是高级安全模型,该模型基于面向应用程序的强制访问控制和沙箱。这使开发人员和用户可以将应用程序的执行限制为在安装时已(强制)分配的特权。因此,可以认为程序代码中漏洞的利用仅限于应用程序沙箱的权限范围之内。但是,在本文中,我们表明特权升级攻击是可能的。我们表明,在运行时利用的真实应用程序或恶意应用程序可以升级授予的权限。我们的结果立即表明,Android的安全模型无法处理传递权限使用攻击,而Android的沙盒模型作为对抗恶意软件和复杂的运行时攻击的最后手段而失败。

著录项

  • 来源
    《Information security》|2010年|p.346-360|共15页
  • 会议地点 Boca Raton FL(US);Boca Raton FL(US)
  • 作者单位

    System Security Lab Ruhr-University Bochum, Germany;

    System Security Lab Ruhr-University Bochum, Germany;

    Fraunhofer-Institut SIT Darmstadt, Technische Universitat Darmstadt, Germany;

    System Security Lab Ruhr-University Bochum, Germany;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 安全保密;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号