This paper discusses security issues on the user equipment, which is the "last mile" of social networks. One of the main Achilles' heel of social networks is not the organization of networks themselves, but the user devices, typically Android ones. The existing system of privileges makes it easy to infiltrate the network via applications installed on users' devices. Conventional signature-based and static analysis methods are vulnerable. Access to privacy-and security-relevant parts of the application programming interface is controlled by the corresponding permission in a manifest file. While requesting access to permissions, it may offer opportunities to malicious codes, which will cause security issues. Few works among permission analysis, however, pay attention to the prevention of permission leakage on both hardware and software frameworks. In this paper we tackle the challenge of providing our multilayered permission-based security extension scheme on Android platforms. We propose a usage and access control model and an effective method of preventing permission leakage based on ARM TrustZone security extension mechanism. In contrast to previous work, the proposed security architecture provides a permission-based mandatory access control on Android middleware, Linux kernel, and hardware layers. The evaluation results demonstrate the effectiveness of the proposed scheme in mitigating permission leakage vulnerabilities.
ARM embedded devices are becoming increasingly ubiquitous, permeating many aspects of daily life. The security issues on ARM embedded devices are much more important in critical infrastructure. The trusted hardware technologies provide the trusted environments isolated from the untrusted part of the system. However, for some deficiency, the researchers focus on current hardware-assisted isolated mechanisms. Depending on the implementation of the protection mechanism, the software-based approaches are not efficient and the hardware-based approaches are not flexible. Moreover, these defense mechanisms need formal specification that is inadequate in recent research. B method is a state-based formal method, which provides a successive refinement mechanism. In this paper, we propose a hardware-assisted memory isolation protection mechanism, provide specifications and refinements using the B method, and implement the memory management system on an ARM-based platform. The evaluation results show that the proposed isolation protection mechanism is effective, and the automatic proof rate of machines is acceptable. KEYWORDSB method, formal specification, hardware-assisted, isolation protection INTRODUCTIONSmart embedded devices with OS on ARM platforms are deployed in automotive, medical, industrial, teaching technologies, and smart cities and in critical infrastructure. With the increasing growth of attacks originated by security threats and vulnerability exploitation, the security of intelligent embedded devices is of strategic importance. 1 Securing ARM embedded devices are challenging because they are special-purpose and resource-constrained. New capabilities of modern trusted hardware technologies allow for the execution of arbitrary code within trusted environments completely isolated from the rest of the system. The software/hardware isolation environment provides an underlying isolation, which enhances the security of embedded devices.Recent research focuses on two key points about current hardware-assisted isolated mechanisms. 2 One is the implementation of the protection mechanism. 3-7 In general, the software-based approaches are not efficient and the hardware-based approaches are not flexible. The theoretic support for these defense mechanisms is inadequate. The other is formal specification using formal methods. 8-10 However, the existing problems are as follows.(1) The existing implementation schemes are lack of effective formal analysis and verification, thus the determinacy of the security policies is difficult to guarantee.(2) The majority of formal models are in a high abstract level, and the applications in the real system are difficult. Motivated by the above research state of the art, the main objective of this work is to present our hardware-assisted memory management mechanism using the B method on ARM platforms. The B method is a formal method enabling the development of secure programs, which uses concepts of first order logic, set theory, and integer arithmetics to specify abstract state machines ...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.