Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android

Author(s):  
Sung-Hoon Lee ◽  
Seung-Hyun Kim ◽  
SooHyung Kim ◽  
Seung-Hun Jin
2017 ◽  
Vol 55 (3) ◽  
pp. 217-223 ◽  
Author(s):  
Claas Lorenz ◽  
David Hock ◽  
Johann Scherer ◽  
Raphael Durner ◽  
Wolfgang Kellerer ◽  
...  

2015 ◽  
Vol 61 (4) ◽  
pp. 311-320 ◽  
Author(s):  
Kathryn Cotterell ◽  
Ian Welch ◽  
Aaron Chen

Abstract The Android operating system (OS) has become the dominant smart phone OS in recent years due to its accessibility, usability and its open-source philosophy. Consequently, this has also made it a popular target for attackers who aim to install malware on Android devices and take advantage of Android’s coarsegrained, non-revoking permission system. This project designs, implements and evaluates a security tool named COMBdroid, which addresses these security concerns in Android by enforcing fine-grained, user-defined policies. COMBdroid modifies an application before installation, allowing it to override points of security vulnerabilities at run-time. As a proof of concept we have implemented three policies in COMBdroid. This paper documents the development process of COMBdroid, deriving design decisions from the literature review, detailing the design and implementation, and proving the program’s effectiveness through evaluation.


2021 ◽  
Vol 12 (2) ◽  
pp. 126
Author(s):  
Enrico Russo ◽  
Luca Verderame ◽  
Alessandro Armando ◽  
Alessio Merlo

2010 ◽  
Vol 1 (1) ◽  
pp. 79-94 ◽  
Author(s):  
Janne Lindqvist ◽  
Essi Vehmersalo ◽  
Miika Komu ◽  
Jukka Manner

Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile clients. The HIP-based firewall learns the identity of a client when it communicates with the server over HIP. The firewall configures the necessary rules based on HIP control messages passing through the firewall. The solution is secure and flexible, and introduces only minimal latency to the initial HIP connection establishment.


2011 ◽  
Vol 16 (6) ◽  
pp. 631-641 ◽  
Author(s):  
Hammad Banuri ◽  
Masoom Alam ◽  
Shahryar Khan ◽  
Jawad Manzoor ◽  
Bahar Ali ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document