CS 563 Mobile OS & Device Security
Advanced Computer Security CS 563 University of Illinois at Urbana-Champaign
Presentation by: Güliz Seray Tuncay
CS 563 Mobile OS & Device Security Advanced Computer Security - - PowerPoint PPT Presentation
CS 563 Mobile OS & Device Security Advanced Computer Security CS 563 University of Illinois at Urbana-Champaign Presentation by: Gliz Seray Tuncay Administrative Announcements : Reaction paper was due today (and all classes)
Presentation by: Güliz Seray Tuncay
2
Announcements:
Learning Objectives:
3
4
6
7
8
9
10
11
12
14
15
16
17
18
19
20
21
Q: Which permission model do you prefer: Installation-Time vs Ask- On-First-Use vs something else? As a user? Complications for developers?
23
Linux Process Dalvik / ART App 1 Linux Process Dalvik / ART App 2
25
26
A1C1 A2C1
ICC Reference Monitor
Intent File System, Sockets
uids of caller and callee
Q: Heavily relying on IPC (Android) vs completely standalone apps (iOS, kind of)? Which one do you think is better?
27
29
30
31
32
33 Wi-Fi Control App Attack App Wi-Fi Manager A c c e s s W i
i ? Permission requested in advance Permission not requested Access Wi-Fi? Access Wi-Fi? confused deputy
[FeltUSENIX11] Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacks and Defenses." USENIX Security Symposium. 2011.
– checkCallingPermission(), checkCallingOrSelfPermission() etc.
34
[FeltUSENIX11] Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacks and Defenses." USENIX Security Symposium. 2011.
35
[FeltUSENIX11] Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacks and Defenses." USENIX Security Symposium. 2011.
36
37
38
[FeltUSENIX11] Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacks and Defenses." USENIX Security Symposium. 2011.
39
[FeltUSENIX11] Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacks and Defenses." USENIX Security Symposium. 2011.
40
[FeltUSENIX11] Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacks and Defenses." USENIX Security Symposium. 2011.
41
[FeltUSENIX11] Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacks and Defenses." USENIX Security Symposium. 2011.
42
[FeltUSENIX11] Felt, Adrienne Porter, et al. "Permission Re-Delegation: Attacks and Defenses." USENIX Security Symposium. 2011.
43
44
45
46
47
– “http://”, “https://”, “file://”, “javascript:”
48
49
Luo, Tongbo, et al. "Attacks on WebView in the Android system." Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 2011
50
JS interfaces Event handlers HTML5 API
51
Expected to be app’s own domain! Have iframes! Navigate to
[TuncayCCS2016] Tuncay, Guliz Seray et al. "Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. CCS 2016"
52
[TuncayCCS2016] Tuncay, Guliz Seray et al. "Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. CCS 2016"
53
[TuncayCCS2016] Tuncay, Guliz Seray et al. "Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. CCS 2016"
subject channel decision point
JS interface event handler HTML5 API
web origin
system
class name method list permission list method list permission list permission list
user
54
[TuncayCCS2016] Tuncay, Guliz Seray et al. "Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. CCS 2016"
Android App Chromium library Policy Manager
Parsing Module
Policy Parser
Permission Parser
Information Unit Policy Map Permission Map Android System WebView Chromium library Static Analysis Module Decompiler Static analyzer
Draconian policies
Enforcement Module
HTML5 JS Interface Event Handler
.apk
App developer App user
subject decisionpoint class name method list permissions
loadUrl (“policyrule:…”)
55
56