Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3484544
|View full text |Cite
|
Sign up to set email alerts
|

Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 47 publications
0
1
0
Order By: Relevance
“…Isolating function execution environments is commonly used in cloud to power serverless computing by re-purposing the existing container platforms. However, container-based virtualization techniques [46,98] fail in their coarse-grained isolating level (e.g., the overall Android filesystem), and thus are unable to apply to Deck. Recent work on isolating individual functions [110] may be a promising solution.…”
Section: Discussionmentioning
confidence: 99%
“…Isolating function execution environments is commonly used in cloud to power serverless computing by re-purposing the existing container platforms. However, container-based virtualization techniques [46,98] fail in their coarse-grained isolating level (e.g., the overall Android filesystem), and thus are unable to apply to Deck. Recent work on isolating individual functions [110] may be a promising solution.…”
Section: Discussionmentioning
confidence: 99%
“…The reason is that we cannot make assumptions about code that does and does not execute. Other works [22,86,93] have faced a similar problem; however, they addressed it for their specific use case: [86] only compared the number of file operations, while [22,93] examined different forms of a call graph. Therefore, we measured the differences between the events in the execution traces by dividing them into 11 high-level categories related to the workings of Android: 1) Accessibility Service (a11y), 2) Broadcast Receivers (BR), 3) Command Line Interface commands (CLI), 4) Content Providers (CP), 5) Dangerous APIs (DAPI), 6) Dynamic Code Loading (DCL), 7) File System (FS), 8) Inter-Process Communication (IPC), 9) Network (NET), 10) Requests for Permissions (PERM), and 11) Systems Services (SS).…”
Section: Bluerun Vs Redrunmentioning
confidence: 99%
“…According to [86], we grouped current Android sandboxes for malware analysis based on the technique on which they are based. There are currently no Android malware sandboxes based on applevel virtualization, so this solution was not considered.…”
Section: Related Work On Android Sandboxesmentioning
confidence: 99%
See 2 more Smart Citations