Proceedings 2014 Network and Distributed System Security Symposium 2014
DOI: 10.14722/ndss.2014.23164
|View full text |Cite
|
Sign up to set email alerts
|

AirBag: Boosting Smartphone Resistance to Malware Infection

Abstract: Abstract-Recent years have experienced explosive growth of smartphone sales. Inevitably, the rise in the popularity of smartphones also makes them an attractive target for attacks. In light of these threats, current mobile platform providers have developed various server-side vetting processes to block malicious applications ("apps"). While helpful, they are still far from ideal in achieving their goals. To make matters worse, the presence of alternative (less-regulated) mobile marketplaces also opens up new a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 53 publications
(15 citation statements)
references
References 25 publications
0
13
0
Order By: Relevance
“…Some existing works can be adapted to facilitate such countermeasures. For example, AirBag [26] supports a decoupled and isolated runtime environment based on OS-level virtualization. ASM [13] provides programmable interfaces that interpose Android APIs and return dummy values to applications.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Some existing works can be adapted to facilitate such countermeasures. For example, AirBag [26] supports a decoupled and isolated runtime environment based on OS-level virtualization. ASM [13] provides programmable interfaces that interpose Android APIs and return dummy values to applications.…”
Section: Countermeasuresmentioning
confidence: 99%
“…A physical phone can have several VPs and users can easily switch among them. AirBag [15], a light-weight OS-level virtualization, isolates and prevents malware from infecting the system or stealthily leaking private information. It builds a restricted execution environment for untrusted apps and also virtualizes various device drivers, such as file system, framebuffer/GPU and input devices.…”
Section: B Virtual Environmentmentioning
confidence: 99%
“…Although recent work [10]- [12] proposes solutions to detect and prevent ICC vulnerability, they are not general for confining resource-abusing apps without ICC channels involved. A stronger security guarantee is provided by virtualization-based solutions -Cells [13], L4Android [14], and AirBag [15] propose system virtualization and isolated execution environment by virtualizing hardware devices. However, they also require heavy environment initialization and extra storage to achieve strong isolation.…”
Section: Introductionmentioning
confidence: 99%
“…They roughly fall into two categories: the first category consists of solutions that extend the Android framework (and even the kernel) to allow fine-tuning of the apps' permissions [5, [14][15][16]27,33,37,45,55]. For example, AppFence [27] and TISSA [55] can be configured to return a mock location, instead of the real one, to the apps.…”
Section: Introductionmentioning
confidence: 99%