欢迎访问中国科学院大学学报,今天是

中国科学院大学学报 ›› 2015, Vol. 32 ›› Issue (5): 667-675.DOI: 10.7523/j.issn.2095-6134.2015.05.013

• 计算机科学 • 上一篇    下一篇

一种基于权限控制机制的Android系统隐蔽信道限制方法

吴敬征1,3, 武延军1,3, 罗天悦1, 武志飞1, 杨牧天1, 王永吉2,3   

  1. 1. 中国科学院软件研究所总体部, 北京 100190;
    2. 中国科学院软件研究所基础软件国家工程中心, 北京 100190;
    3. 中国科学院软件研究所计算机科学国家重点实验室, 北京 100190
  • 收稿日期:2014-10-11 修回日期:2015-03-27 发布日期:2015-09-15
  • 通讯作者: 吴敬征
  • 基金资助:

    国家自然科学基金(61303057, 61170072)和核高基国家科技重大专项(2012ZX01039-004)资助

A new mitigation approach for covert channel of Android operating system based on permission mechanism

WU Jingzheng1,3, WU Yanjun1,3, LUO Tianyue1, WU Zhifei1, YANG Mutian1, WANG Yongji2,3   

  1. 1. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China;
    2. National Engineering Research Center for Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China;
    3. State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
  • Received:2014-10-11 Revised:2015-03-27 Published:2015-09-15

摘要:

移动智能终端凭借全新的体系结构、安全机制、丰富的传感设备及应用,在国内拥有近5亿台的市场.然而这些新特性却导致了比经典的攻击行为更复杂的新安全问题——移动智能终端隐蔽信道,泄漏用户隐私.针对Android移动智能终端这种新的复杂环境,目前仍缺乏有效的消除限制方法.本文将Android系统隐蔽信道分成基于共享资源的智能终端隐蔽信道和基于传感器设备的隐蔽信道两种基本模型,并深入研究传感器隐蔽信道的形成机理.通过对Android系统权限控制安全机制的分析,扩展权限控制机制的保护范围,设计和实现了基于权限控制机制的Android系统传感器隐蔽信道限制方法.实验证明该方法在实际的隐蔽信道限制中能够达到限制效果.

关键词: Android, 隐蔽信道, 权限控制机制, Android传感器, 隐蔽信道限制

Abstract:

About 500 million of smart mobile devices have been sold in China because of the new architecture, secure mechanism, rich sensors, and applications. However, the new features cause a new secure problem named smart mobile device covert channel, which is more dangerous than the traditional attacks and leaks users' privacy. At the present stage there are no elimination and mitigation methods. In this work, the Android covert channels are classified into two models including the shared resource-based Android covert channel and the sensor-based covert channel. The latter one has been carefully studied in this work. The new secure features of permission mechanisms is analyzed and extended to protect the sensors. A new mitigation approach for sensor-based channel is designed and implemented, and the experiments show that the covert channel can be mitigated perfectly.

Key words: Android, covert channel, permission mechanism, Android sensors, covert channel mitigation

中图分类号: