loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Elena Reshetova 1 ; Filippo Bonazzi 2 ; Thomas Nyman 2 ; Ravishankar Borgaonkar 2 and N. Asokan 3

Affiliations: 1 Intel OTC and Aalto University, Finland ; 2 Aalto University, Finland ; 3 Aalto University and University of Helsinki, Finland

ISBN: 978-989-758-167-0

Keyword(s): Security, Access Control, SELinux, SEAndroid.

Related Ontology Subjects/Areas/Topics: Access Control ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Internet Technology ; Web Information Systems and Technologies

Abstract: Starting from the 5.0 Lollipop release all Android processes must be run inside confined SEAndroid access control domains. As a result, Android device manufacturers were compelled to develop SEAndroid expertise in order to create policies for their device-specific components. In this paper we analyse SEAndroid policies from a number of 5.0 Lollipop devices on the market, and identify patterns of common problems we found. We also suggest some practical tools that can improve policy design and analysis. We implemented the first of such tools, SEAL.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.189.171

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Reshetova, E.; Bonazzi, F.; Nyman, T.; Borgaonkar, R. and Asokan, N. (2016). Characterizing SEAndroid Policies in the Wild.In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 482-489. DOI: 10.5220/0005759204820489

@conference{icissp16,
author={Elena Reshetova. and Filippo Bonazzi. and Thomas Nyman. and Ravishankar Borgaonkar. and N. Asokan.},
title={Characterizing SEAndroid Policies in the Wild},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={482-489},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005759204820489},
isbn={978-989-758-167-0},
}

TY - CONF

JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Characterizing SEAndroid Policies in the Wild
SN - 978-989-758-167-0
AU - Reshetova, E.
AU - Bonazzi, F.
AU - Nyman, T.
AU - Borgaonkar, R.
AU - Asokan, N.
PY - 2016
SP - 482
EP - 489
DO - 10.5220/0005759204820489

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.