inferring required permissions for statically composed
play

Inferring Required Permissions for Statically Composed Programs - PowerPoint PPT Presentation

Inferring Required Permissions for Statically Composed Programs Tero Hasu Anya Helene Bagge Magne Haveraaen {tero,anya,magne}@ii.uib.no Bergen Language Design Laboratory University of Bergen Hasu, Bagge, Haveraaen (BLDL) Inferring Required


  1. Inferring Required Permissions for Statically Composed Programs Tero Hasu Anya Helene Bagge Magne Haveraaen {tero,anya,magne}@ii.uib.no Bergen Language Design Laboratory University of Bergen Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs

  2. Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs

  3. smartphones—a security risk for users Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs ▶ privacy and usage cost concerns ▶ natively third-party programmable ▶ ”app stores” have programs in large numbers ▶ including malware and ”grayware”

  4. permission-based security models implications? Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs ▶ similar to VAX/VMS ”privileges” introduced in late 70’s ▶ popularized by smartphone OSes ▶ primarily: access control for sensitive APIs ▶ user approval of permissions → security and usability

  5. permissions—a concern for app developers declaring permissions Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs too small a set � runtime errors too large a set � worried users optimal set � maintenance hassle

  6. hassle compounds in a cross-platform setting of permission Hasu, Bagge, Haveraaen (BLDL) channel distribution restrictions multiple variants releases documented between platform requirements vary Inferring Required Permissions for Statically Composed Programs ▶ permission ▶ often inadequately ▶ an app may come in ▶ sometimes because ▶ can differ per

  7. prevalent smartphone vendor supported approach Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs ▶ infer required permissions from a program’s platform API use

  8. inverse inference: API use from permissions? ; ; Music Player Remote Control API Hasu, Bagge, Haveraaen (BLDL) (capabilities)))) WriteUserData WriteDeviceData) '(ReadDeviceData ReadUserData (sublist? ( = (kit-vernum.attr) 31) ( <= (s60-vernum.attr) 32)) ( and ( >= (s60-vernum.attr) 31) ( and ( define/public (have-mplayerremotecontrol.attr) (Symbian) accessibility Inferring Required Permissions for Statically Composed Programs compute compute ▶ ContextLogger2—a maximally intrusive app (unusual case) ▶ configuration script − − − − − → available permissions ▶ target & certificate − − − − − → available/accessible APIs ▶ target & SDK & permissions ▶ � lots of conditional compilation at API use sites

  9. analysis difficult/impossible prevalent smartphone vendor supported approach Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs ▶ infer required permissions from a program’s platform API use ▶ some tools are available ▶ examine either binaries or source code ▶ current tools for scanning native programs rely on heuristics ▶ dynamic loading and invocation (when allowed) make accurate

  10. permission analysis tools availability bada API and Privilege Checker BB10 none Harmattan aegis-manifest (automatically generates a declaration) Symbian Capability Scanner Tizen API and Privilege Checker WP7 Store Test Kit (managed code only in WP7 apps) WP8 none Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs Android Stowaway, Permission Check Tool (both 3rd party)

  11. cross-platform permission inference API use determine API use Can reuse the same API: domain engineering Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs ▶ infer required permissions from a program’s platform-agnostic ▶ implementations encapsulate platform API use ▶ and: declare permissions for each implementation of said APIs ▶ and: program against said APIs in a language you can analyze to ▶ for multiple platforms (if can implement) ▶ in multiple apps (if suitably general)

  12. favorable language characteristics interface-based abstraction static analysis friendliness Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs ▶ to support organizing cross-platform codebases ▶ to allow for accurate inference

  13. adopting the approach in-source permission annotations Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs ▶ adopt a favorable language, preferably ▶ (coding conventions may help) ▶ as an extra-language feature (probably within comments) ▶ using any language-provided annotation support ▶ by extending the language

  14. errors) our proof of concept: based on Magnolia reporting—Bagge: Separating exceptional concerns (2012) handling mechanisms should be configurable (2012) Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs ▶ general-purpose research programming language Magnolia ▶ http://magnolia-lang.org/ ▶ its implementation provides the required language infrastructure ▶ permission management is just one application for Magnolia ▶ perhaps: address error handling in general (not just permission ▶ separate idea of partiality from concrete details of error ▶ abstract over different mechanisms—Hasu: Concrete error

  15. Magnolia’s interface-based abstraction Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs ▶ a Magnolia interface is declared as a concept ▶ each concept may have multiple implementation s ▶ one implementation may satisfy multiple concept s

  16. Magnolia’s static analysis friendliness ”wiring” of components Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs ▶ Magnolia avoids ”dynamism” ▶ no pointers, carefully controlled aliasing ▶ no runtime passing of code (e.g., no higher-order functions) ▶ abstract data types, not objects ▶ concrete type and operations known at compile time ▶ makes up for restrictions with extensive support for static ▶ Magnolia promotes use of semantically rich concepts ▶ a concept may specify (some) semantics as axiom s ▶ an operation may specify use limitations as guard s

  17. declaring in Magnolia—what & how alert RequiresPermission unless pre SNS_SERVICE() Hasu, Bagge, Haveraaen (BLDL) PRIVILEGE_DENIED names (per operation, per implementation ) Inferring Required Permissions for Statically Composed Programs per implementation ) ▶ platform-specific required permission information (per operation, ▶ as a predicate expression—commonly need && , sometimes || ▶ to be collated into an inference result for a program ▶ e.g., ▶ platform-agnostic, abstract permission error names (once each) ▶ to allow for error-handling in portable code ▶ e.g., alert NoPermissionSocial <: NoPermissionCloud; ▶ mappings between platform-specific, concrete errors and error ▶ for the compiler to implement the mapping ▶ e.g., alert NoPermissionSocial if post value == E_

  18. domain engineering an exporter: data extraction and outputting concept DataSrc = { use World; use DataCollection; procedure readAll( upd sys : System, out coll : Coll); }; concept DataTgt = { use World; use DataCollection; procedure writeAll( upd sys : System, obs coll : Coll); }; Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs

  19. runtime permission errors implementation Permissions = { alert NoPermission; }; Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs

  20. platform-specific permissions implementation HarmattanPermissions = { use Permissions; predicate TrackerReadAccess() = Permission; // Harmattan predicate TrackerWriteAccess() = Permission; // Harmattan predicate GrpMetadataUsers() = Permission; // Harmattan // ... }; implementation SymbianPermissions = { use Permissions; predicate ReadUserData() = Permission; // Symbian // ... }; Pardon the verbose syntax! Hasu, Bagge, Haveraaen (BLDL) Inferring Required Permissions for Statically Composed Programs

  21. Symbian-native contacts reader implementation /* more alerts ... */ ; Hasu, Bagge, Haveraaen (BLDL) models DataSrc; } with SymbianNativeContactsSrc use DataCollection; use World; use SymbianPermissions; satisfaction SymbianNativeContactsIsDataSrc = { }; alert NoPermission if leaving KErrPermissionDenied implementation SymbianNativeContactsSrc = alert RequiresPermission unless pre ReadUserData() procedure readAll( upd sys : System, out coll : Coll) require SymbianPermissions; require type Coll; require type System; external C++ datasrc.SymbianContacts { Inferring Required Permissions for Statically Composed Programs

  22. same for Harmattan alert NoPermission unless pre haveQtContactsPerms() Hasu, Bagge, Haveraaen (BLDL) models DataSrc; } with HarmattanQtContactsSrc use DataCollection; use World; use HarmattanPermissions; satisfaction HarmattanQtContactsIsDataSrc = { }; /* more alerts ... */ ; GrpMetadataUsers() implementation HarmattanQtContactsSrc = TrackerReadAccess() && TrackerWriteAccess() && alert RequiresPermission unless pre procedure readAll( upd sys : System, out coll : Coll) require HarmattanPermissions; require type Coll; require type System; external C++ datasrc.HarmattanContacts { Inferring Required Permissions for Statically Composed Programs

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend