Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

The Android Platform Security Model (2023) (1904.05572v3)

Published 11 Apr 2019 in cs.CR and cs.OS

Abstract: Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. To support this flexibility, Android's security model must strike a difficult balance between security, privacy, and usability for end users; provide assurances for app developers; and maintain system performance under tight hardware constraints. This paper aims to both document the assumed threat model and discuss its implications, with a focus on the ecosystem context in which Android exists. We analyze how different security measures in past and current Android implementations work together to mitigate these threats, and, where there are special cases in applying the security model in practice; we discuss these deliberate deviations and examine their impact.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (188)
  1. 2015. Stagefright Vulnerability Report. https://www.kb.cert.org/vuls/id/924951
  2. 2017. BlueBorne. https://go.armis.com/hubfs/BlueBorne%20-%20Android%20Exploit%20(20171130).pdf?t=1529364695784
  3. 2017. CVE-2017-13177. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13177
  4. 2018a. CVE-2017-17558: Remote code execution in media frameworks. https://source.android.com/security/bulletin/2018-06-01#kernel-components
  5. 2018b. CVE-2018-9341: Remote code execution in media frameworks. https://source.android.com/security/bulletin/2018-06-01#media-framework
  6. 2018a. SVE-2018-11599: Theft of arbitrary files leading to emails and email accounts takeover. https://security.samsungmobile.com/securityUpdate.smsb
  7. 2018b. SVE-2018-11633: Buffer Overflow in Trustlet. https://security.samsungmobile.com/securityUpdate.smsb
  8. 2019. Android Now FIDO2 Certified. https://fidoalliance.org/android-now-fido2-certified-accelerating-global-migration-beyond-passwords/
  9. 2020. Personal identification – ISO-compliant driving licence – Part 5: Mobile driving licence (mDL) application. Draft International Standard: ISO/IEC DIS 18013-5.
  10. 2021. Android 12 and Android 12 release notes. https://source.android.com/docs/setup/about/android-12-release#2g-toggle
  11. 2022. Hacked documents: how Iran can track and control protesters phones. https://theintercept.com/2022/10/28/iran-protests-phone-surveillance/
  12. 2022. Vulnerability within the Unisoc baseband opens mobile phone communications to remote hacker attacks. https://research.checkpoint.com/2022/vulnerability-within-the-unisoc-baseband/
  13. 2023. Android Security White Paper 2023. https://services.google.com/fh/files/misc/android-enterprise-security-paper-2023.pdf
  14. SoK: Lessons Learned from Android Security Research for Appified Software Platforms. In 2016 IEEE Symposium on Security and Privacy (SP). 433–451. https://doi.org/10.1109/SP.2016.33
  15. Anne Adams and Martina Angela Sasse. 1999. Users Are Not the Enemy. Commun. ACM 42, 12 (Dec. 1999), 40–46. https://doi.org/10.1145/322796.322806
  16. Andrew Ahn. 2018. How we fought bad apps and malicious developers in 2017. https://android-developers.googleblog.com/2018/01/how-we-fought-bad-apps-and-malicious.html
  17. From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It. Journal of Management Information Systems 33, 3 (2016), 713–743. https://doi.org/10.1080/07421222.2016.1243947
  18. Mobile secure data protection using eMMC RPMB partition. In 2015 International Conference on Computing and Network Communications (CoCoNet). 946–950. https://doi.org/10.1109/CoCoNet.2015.7411305
  19. AOSP. [n.d.]a. Android Compatibility Definition Document. https://source.android.com/compatibility/cdd
  20. AOSP. [n.d.]b. Android Enterprise Recommended requirements. https://www.android.com/enterprise/recommended/requirements/
  21. AOSP. [n.d.]c. Android isolatedProcess feature. https://developer.android.com/guide/topics/manifest/service-element#isolated
  22. AOSP. [n.d.]d. Android platform permissions requesting guidance. https://material.io/design/platform-guidance/android-permissions.html#request-types
  23. AOSP. [n.d.]e. Android Verified Boot Flow. https://source.android.com/security/verifiedboot/boot-flow
  24. AOSP. [n.d.]f. Android Virtualization Framework (AVF). https://source.android.com/docs/core/virtualization
  25. AOSP. [n.d.]g. App hibernation. https://developer.android.com/topic/performance/app-hibernation
  26. AOSP. [n.d.]h. App Manifest Overview. https://developer.android.com/guide/topics/manifest/manifest-intro
  27. AOSP. [n.d.]i. App Manifest permission element. https://developer.android.com/guide/topics/manifest/permission-element
  28. AOSP. [n.d.]j. Define a custom app permission. https://developer.android.com/guide/topics/permissions/defining
  29. AOSP. [n.d.]k. Developer documentation android.security.identity. https://developer.android.com/reference/android/security/identity/package-summary
  30. AOSP. [n.d.]l. Developer documentation android.security.keystore.KeyGenParameterSpec. https://developer.android.com/reference/android/security/keystore/KeyGenParameterSpec
  31. AOSP. [n.d.]m. Gatekeeper. https://source.android.com/security/authentication/gatekeeper
  32. AOSP. [n.d.]n. Hardware-backed Keystore. https://source.android.com/security/keystore/
  33. AOSP. [n.d.]o. Intents and Intent Filters. https://developer.android.com/guide/components/intents-filters
  34. AOSP. [n.d.]p. MAC address availability changes in Android 11. https://developer.android.com/training/articles/user-data-ids#mac-11-plus
  35. AOSP. [n.d.]q. Network security configuration. https://developer.android.com/training/articles/security-config
  36. AOSP. [n.d.]r. Privacy in Android 11. https://developer.android.com/about/versions/11/privacy
  37. AOSP. [n.d.]s. Privacy: MAC Randomization. https://source.android.com/devices/tech/connect/wifi-mac-randomization
  38. AOSP. [n.d.]t. Privileged Permission Allowlisting. https://source.android.com/devices/tech/config/perms-whitelist
  39. AOSP. [n.d.]u. Restrictions on non-SDK interfaces. https://developer.android.com/distribute/best-practices/develop/restrictions-non-sdk-interfaces
  40. AOSP. [n.d.]v. Security Updates and Resources - Process Types. https://source.android.com/security/overview/updates-resources#process_types
  41. AOSP. [n.d.]w. Tapjacking. https://developer.android.com/topic/security/risks/tapjacking
  42. AOSP. [n.d.]x. Trusty TEE. https://source.android.com/docs/security/features/trusty
  43. AOSP. [n.d.]y. Verifying Boot. https://source.android.com/security/verifiedboot/verified-boot
  44. AOSP. [n.d.]z. Verifying hardware-backed key pairs with Key Attestation. https://developer.android.com/training/articles/security-key-attestation
  45. AOSP. 2018a. Android Protected Confirmation. https://developer.android.com/preview/features/security#android-protected-confirmation
  46. AOSP. 2018b. Android Verified Boot 2.0. https://android.googlesource.com/platform/external/avb/+/android11-release/README.md
  47. AOSP. 2018c. APK Signature Scheme v3. https://source.android.com/security/apksigning/v3
  48. AOSP. 2018d. SELinux for Android 8.0: Changes & Customizations. https://source.android.com/security/selinux/images/SELinux_Treble.pdf
  49. AOSP. 2019. Restrictions on starting activities from the background. https://developer.android.com/guide/components/activities/background-starts
  50. AOSP. 2020a. Android 11 biometric authentication. https://developer.android.com/about/versions/11/features#biometric-auth
  51. AOSP. 2020b. Security and Privacy Enhancements in Android 10. https://source.android.com/security/enhancements/enhancements10
  52. ARM. 2019. Memory Tagging Extension: Enhancing memory safety through architecture. https://community.arm.com/arm-community-blogs/b/architectures-and-processors-blog/posts/enhancing-memory-safety
  53. Dan Austin and Jeff Vander Stoep. 2016. Hardening the media stack. https://android-developers.googleblog.com/2016/05/hardening-media-stack.html
  54. Smudge Attacks on Smartphone Touch Screens. In Proceedings of the 4th USENIX Conference on Offensive Technologies (Washington, DC) (WOOT’10). USENIX Association, USA, 1–7.
  55. Steve Barker. 2009. The next 700 Access Control Models or a Unifying Meta-Model?. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (Stresa, Italy) (SACMAT ’09). Association for Computing Machinery, New York, NY, USA, 187–196. https://doi.org/10.1145/1542207.1542238
  56. Baton: Certificate Agility for Android’s Decentralized Signing Infrastructure. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks (Oxford, United Kingdom) (WiSec ’14). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/2627393.2627397
  57. D. Bell and L. LaPadula. 1975. Secure Computer System Unified Exposition and Multics Interpretation. Technical Report MTR-2997. MITRE Corp., Bedford, MA.
  58. M. Benantar. 2005. Access Control Systems: Security, Identity Management and Trust Models.
  59. James Bender. 2018. Google Play security metadata and offline app distribution. https://android-developers.googleblog.com/2018/06/google-play-security-metadata-and.html
  60. A Logical Framework for Reasoning about Access Control Models. ACM Trans. Inf. Syst. Secur. 6, 1 (Feb. 2003), 71–127. https://doi.org/10.1145/605434.605437
  61. Address Obfuscation: An Efficient Approach to Combat a Board Range of Memory Error Exploits. In Proc. USENIX Security Symposium - Volume 12 (Washington, DC). USENIX Association, Berkeley, CA, USA, 8–8. http://dl.acm.org/citation.cfm?id=1251353.1251361
  62. Bram Bonné and Chad Brubaker. 2019. An Update on Android TLS Adoption. https://security.googleblog.com/2019/12/an-update-on-android-tls-adoption.html
  63. Chad Brubaker. 2014. Introducing nogotofail — a network traffic security testing tool. https://security.googleblog.com/2014/11/introducing-nogotofaila-network-traffic.html
  64. Chad Brubaker. 2018. Protecting users with TLS by default in Android P. https://android-developers.googleblog.com/2018/04/protecting-users-with-tls-by-default-in.html
  65. SoK: Shining Light on Shadow Stacks. In 2019 IEEE Symposium on Security and Privacy (SP). 985–999. https://doi.org/10.1109/SP.2019.00076
  66. Pierre Carru. 2017. Attack TrustZone with Rowhammer. http://www.eshard.com/wp-content/plugins/email-before-download/download.php?dl=9465aa084ff0f070a3acedb56bcb34f5
  67. Dan Cashman. 2017. SELinux in Android O: Separating Policy to Allow for Independent Updates. https://events.static.linuxfound.org/sites/events/files/slides/LSS%20-%20Treble%20%27n%27%20SELinux.pdf Linux Security Summit.
  68. Jen Chai. 2019. Giving users more control over their location data. https://android-developers.googleblog.com/2019/03/giving-users-more-control-over-their.html
  69. Analysis of SEAndroid Policies: Combining MAC and DAC in Android. In Proceedings of the 33rd Annual Computer Security Applications Conference (Orlando, FL, USA) (ACSAC 2017). ACM, New York, NY, USA, 553–565. https://doi.org/10.1145/3134600.3134638
  70. Lockscreen and authentication improvements in Android 11. https://android-developers.googleblog.com/2020/09/lockscreen-and-authentication.html
  71. Peeking into your app without actually seeing it:{{\{{UI}}\}} state inference and novel android attacks. In 23rd {normal-{\{{USENIX}normal-}\}} Security Symposium ({normal-{\{{USENIX}normal-}\}} Security 14). 1037–1052.
  72. Erika Chin and David Wagner. 2014. Bifocals: Analyzing webview vulnerabilities in android applications. In Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers 14. Springer, 138–159.
  73. Jiska Classen and Matthias Hollick. 2019. Inside job: diagnosing bluetooth lower layers using off-the-shelf devices. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019. ACM, 186–191. https://doi.org/10.1145/3317549.3319727
  74. Paul Crowley and Eric Biggers. 2018. Adiantum: length-preserving encryption for entry-level processors. IACR Transactions on Symmetric Cryptology 2018, 4 (Dec. 2018), 39–61. https://doi.org/10.13154/tosc.v2018.i4.39-61
  75. Edward Cunningham. 2017. Improving app security and performance on Google Play for years to come. https://android-developers.googleblog.com/2017/12/improving-app-security-and-performance.html
  76. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 401–416. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/davi
  77. Sabrina De Capitani di Vimercati. 2011. Access Matrix. Springer US, Boston, MA, 14–17. https://doi.org/10.1007/978-1-4419-5906-5_807
  78. Why Phishing Works. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Montréal, Québec, Canada) (CHI ’06). ACM, New York, NY, USA, 581–590. https://doi.org/10.1145/1124772.1124861
  79. Danny Dolev and Andrew Chi chih Yao. 1983. On the security of public key protocols. IEEE Transactions on Information Theory 29 (1983), 198–208. Issue 2. https://doi.org/10.1109/TIT.1983.1056650
  80. Hackers in Your Pocket: A Survey of Smartphone Security Across Platforms. Technical Report 2012,7. RWTH Aachen University. https://itsec.rwth-aachen.de/publications/ae_hacker_in_your_pocket.pdf
  81. Understanding Shoulder Surfing in the Wild: Stories from Users and Observers. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI ’17). Association for Computing Machinery, New York, NY, USA, 4254–4265. https://doi.org/10.1145/3025453.3025636
  82. Understanding Android Security. IEEE Security Privacy 7, 1 (Jan 2009), 50–57. https://doi.org/10.1109/MSP.2009.26
  83. Why Eve and Mallory Love Android: An Analysis of Android SSL (in)Security. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (Raleigh, North Carolina, USA) (CCS ’12). ACM, New York, NY, USA, 50–61. https://doi.org/10.1145/2382196.2382205
  84. Rethinking SSL Development in an Appified World. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (Berlin, Germany) (CCS ’13). ACM, New York, NY, USA, 49–60. https://doi.org/10.1145/2508859.2516655
  85. Diversity in Smartphone Usage. In Proc. 8th International Conference on Mobile Systems, Applications, and Services (San Francisco, California, USA) (MobiSys ’10). ACM, New York, NY, USA, 179–194. https://doi.org/10.1145/1814433.1814453
  86. Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys Tutorials 17, 2 (2015), 998–1022. https://doi.org/10.1109/COMST.2014.2386139
  87. How to Ask for Permission. In HotSec.
  88. Android Permissions: User Attention, Comprehension, and Behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (Washington, D.C.) (SOUPS ’12). ACM, New York, NY, USA, Article 3, 14 pages. https://doi.org/10.1145/2335356.2335360
  89. Android UI Deception Revisited: Attacks and Defenses. In Financial Cryptography and Data Security (Lecture Notes in Computer Science). Springer, Berlin, Heidelberg, 41–59. https://doi.org/10.1007/978-3-662-54970-4_3
  90. Nate Fischer. 2018. Protecting WebView with Safe Browsing. https://android-developers.googleblog.com/2018/04/protecting-webview-with-safe-browsing.html
  91. Google APIs for Android. [n.d.]. . https://developers.google.com/android/reference/com/google/android/gms/fido/Fido
  92. Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland). San Jose, CA.
  93. The most dangerous code in the world: validating SSL certificates in non-browser software. In ACM Conference on Computer and Communications Security. 38–49.
  94. Anwar Ghuloum. 2019. Fresher OS with Projects Treble and Mainline. https://android-developers.googleblog.com/2019/05/fresher-os-with-projects-treble-and-mainline.html
  95. Marco Grassi and Xingyu Chen. 2021. Gaining remote code execution on 5G smartphones. https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-Over-The-Air-Baseband-Exploit-Gaining-Remote-Code-Execution-On-5G-Smartphones.pdf BlackHat.
  96. Lest We Remember: Cold-boot Attacks on Encryption Keys. Commun. ACM 52, 5 (May 2009), 91–98. https://doi.org/10.1145/1506409.1506429
  97. BigMAC: Fine-Grained Policy Analysis of Android Firmware. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 271–287. https://www.usenix.org/conference/usenixsecurity20/presentation/hernandez
  98. Diversity in Locked and Unlocked Mobile Device Usage. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp 2014). ACM Press, 379–384. https://doi.org/10.1145/2638728.2641697
  99. Mobile Device Usage Characteristics: The Effect of Context and Form Factor on Locked and Unlocked Usage. In Proc. MoMM 2014: 12th International Conference on Advances in Mobile Computing and Multimedia (Kaohsiung, Taiwan). ACM Press, New York, NY, USA, 105–114. https://doi.org/10.1145/2684103.2684156
  100. A Large-Scale, Long-Term Analysis of Mobile Device Usage Characteristics. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 2, Article 13 (June 2017), 21 pages. https://doi.org/10.1145/3090078
  101. Sebastian Höbarth and René Mayrhofer. 2011. A framework for on-device privilege escalation exploit execution on Android. In Proc. IWSSI/SPMU 2011: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, colocated with Pervasive 2011 (San Francisco, CA, USA).
  102. Real-world Identification for an Extensible and Privacy-preserving Mobile eID. In Privacy and Identity Management. The Smart Revolution. Privacy and Identity 2017. IFIP AICT, Vol. 526/2018. Springer, Ispra, Italy, 354–370. https://doi.org/10.1007/978-3-319-92925-5_24
  103. Jay Hou. 2023. Pixel Binary Transparency: verifiable security for Pixel devices. https://security.googleblog.com/2023/08/pixel-binary-transparency-verifiable.html
  104. Insecure connection bootstrapping in cellular networks: the root of all evil. In Proceedings of the 12th Conference on security and privacy in wireless and mobile networks. ACM, 1–11.
  105. A11Y Attacks: Exploiting Accessibility in Operating Systems. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (Scottsdale, Arizona, USA) (CCS ’14). ACM, New York, NY, USA, 103–115. https://doi.org/10.1145/2660267.2660295
  106. Hardening Firmware Across the Android Ecosystem. https://security.googleblog.com/2023/02/hardening-firmware-across-android.html
  107. Android 14 introduces first-of-its-kind cellular connectivity security features. https://security.googleblog.com/2023/08/android-14-introduces-first-of-its-kind.html
  108. Troy Kensinger. 2018. Google and Android have your back by protecting your backups. https://security.googleblog.com/2018/10/google-and-android-have-your-back-by.html
  109. Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI ’18). Association for Computing Machinery, New York, NY, USA, 1–10. https://doi.org/10.1145/3173574.3173738
  110. Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. In Detection of Intrusions and Malware, and Vulnerability Assessment, Magnus Almgren, Vincenzo Gulisano, and Federico Maggi (Eds.). Springer International Publishing, Cham, 3–24.
  111. Erik Kline and Ben Schwartz. 2018. DNS over TLS support in Android P Developer Preview. https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html
  112. Spectre Attacks: Exploiting Speculative Execution. arXiv:1801.01203 [cs] (2018). arXiv:1801.01203 http://arxiv.org/abs/1801.01203
  113. Nick Kralevich. 2016. The Art of Defense: How vulnerabilities help shape security features and mitigations in Android. https://www.blackhat.com/docs/us-16/materials/us-16-Kralevich-The-Art-Of-Defense-How-Vulnerabilities-Help-Shape- Security-Features-And-Mitigations-In-Android.pdf BlackHat.
  114. On Malware Leveraging the Android Accessibility Framework. In Mobile and Ubiquitous Systems: Computing, Networking, and Services, Ivan Stojmenovic, Zixue Cheng, and Song Guo (Eds.). Springer International Publishing, Cham, 512–523.
  115. A Survey on Security for Mobile Devices. Communications Surveys & Tutorials 15 (01 2013), 446–471.
  116. Ben Lapid and Avishai Wool. 2019. Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis. In Selected Areas in Cryptography – SAC 2018, Carlos Cid and Michael J. Jacobson Jr. (Eds.). Springer International Publishing, Cham, 235–256.
  117. Certificate Transparency. https://www.rfc-editor.org/info/rfc6962
  118. I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis. arXiv:1404.7431 [cs] (April 2014). http://arxiv.org/abs/1404.7431
  119. Static analysis of Android apps: A systematic literature review. Information and Software Technology 88 (2017), 67 – 95. https://doi.org/10.1016/j.infsof.2017.04.001
  120. Android custom permissions demystified: From privilege escalation to design shortcomings. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 70–86.
  121. Eugene Liderman and Sara N-Marandi. 2022. I/O 2022: Android 13 security and privacy (and more​). https://security.googleblog.com/2022/05/io-2022-android-13-security-and-privacy.html
  122. ANDRUBIS – 1,000,000 Apps Later: A View on Current Android Malware Behaviors. In 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS). 3–17. https://doi.org/10.1109/BADGERS.2014.7
  123. Meltdown. arXiv:1801.01207 [cs] (2018). arXiv:1801.01207 http://arxiv.org/abs/1801.01207
  124. OAuth 2.0 Threat Model and Security Considerations. https://www.rfc-editor.org/info/rfc6819
  125. Ivan Lozano. 2018. Compiler-based security mitigations in Android P. https://android-developers.googleblog.com/2018/06/compiler-based-security-mitigations-in.html
  126. Ivan Lozano and Roger Piqueras Jover. 2023. Hardening cellular basebands in Android. https://security.googleblog.com/2023/12/hardening-cellular-basebands-in-android.html
  127. Attacks on WebView in the Android system. In Proceedings of the 27th Annual Computer Security Applications Conference. 343–352.
  128. Iliyan Malchev. 2017. Here comes Treble: A modular base for Android. https://android-developers.googleblog.com/2017/05/here-comes-treble-modular-base-for.html
  129. Android Private Compute Core Architecture. https://doi.org/10.48550/ARXIV.2209.10317
  130. Matthew Maurer and Mike Yu. 2022. DNS-over-HTTP/3 in Android. https://security.googleblog.com/2022/07/dns-over-http3-in-android.html
  131. René Mayrhofer. 2014. An Architecture for Secure Mobile Devices. Security and Communication Networks (2014). https://doi.org/10.1002/sec.1028
  132. René Mayrhofer. 2019. Insider Attack Resistance in the Android Ecosystem. https://www.usenix.org/conference/enigma2019/presentation/mayrhofer
  133. Adversary Models for Mobile Device Authentication. arXiv:2009.10150 [cs.CR]
  134. An Empirical Study of API Stability and Adoption in the Android Ecosystem. In 2013 IEEE International Conference on Software Maintenance. 70–79. https://doi.org/10.1109/ICSM.2013.18
  135. I. Mohamed and D. Patel. 2015. Android vs iOS Security: A Comparative Study. In 2015 12th International Conference on Information Technology - New Generations. 725–730. https://doi.org/10.1109/ITNG.2015.123
  136. Vishwath Mohan. 2018. Better Biometrics in Android P. https://android-developers.googleblog.com/2018/06/better-biometrics-in-android-p.html
  137. Sara N-Marandi. 2021. What’s new in Android Privacy. https://android-developers.googleblog.com/2021/05/android-security-and-privacy-recap.html
  138. Vikrant Nanda and René Mayrhofer. 2018. Android Pie à la mode: Security & Privacy. https://android-developers.googleblog.com/2018/12/android-pie-la-mode-security-privacy.html
  139. Yomna Nasser. 2019. Gotta Catch ’Em All: Understanding How IMSI-Catchers Exploit Cell Networks. https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks
  140. Sundar Pichai. 2018. Android has created more choice, not less. https://blog.google/around-the-globe/google-europe/android-has-created-more-choice-not-less/
  141. Cooper Quintin. 2022. VICTORY: Google Releases “disable 2g” Feature for New Android Smartphones. https://www.eff.org/deeplinks/2022/01/victory-google-releases-disable-2g-feature-new-android-smartphones
  142. 50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 603–620. https://www.usenix.org/conference/usenixsecurity19/presentation/reardon
  143. Only play in your comfort zone: interaction methods for improving security awareness on mobile devices. Personal and Ubiquitous Computing (27 March 2015), 1–14. https://doi.org/10.1007/s00779-015-0840-5
  144. User-driven access control: Rethinking permission granting in modern operating systems. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP’12. 224–238. https://doi.org/10.1109/SP.2012.24
  145. Applying Relay Attacks to Google Wallet. In Proceedings of the Fifth International Workshop on Near Field Communication (NFC 2013). IEEE, Zurich, Switzerland. https://doi.org/10.1109/NFC.2013.6482441
  146. Call me maybe: eavesdropping encrypted LTE calls with REVOLTE. In Proceedings of the 29th USENIX Conference on Security Symposium. 73–88.
  147. R. S. Sandhu and P. Samarati. 1994. Access control: principle and practice. IEEE Communications Magazine 32, 9 (Sept 1994), 40–48. https://doi.org/10.1109/35.312842
  148. CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). 303–312. https://doi.org/10.1109/ICDCS.2016.46
  149. AddressSanitizer: A Fast Address Sanity Checker. In Presented as part of the 2012 USENIX Annual Technical Conference (USENIX ATC 12). USENIX, Boston, MA, 309–318. https://www.usenix.org/conference/atc12/technical-sessions/presentation/serebryany
  150. Memory Tagging and how it improves C/C++ memory safety. CoRR abs/1802.09517 (2018). arXiv:1802.09517 http://arxiv.org/abs/1802.09517
  151. SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles (Stevenson, Washington, USA) (SOSP ’07). ACM, New York, NY, USA, 335–350. https://doi.org/10.1145/1294261.1294294
  152. On the Effectiveness of Address-space Randomization. In Proceedings of the 11th ACM Conference on Computer and Communications Security (Washington DC, USA) (CCS ’04). ACM, New York, NY, USA, 298–307. https://doi.org/10.1145/1030083.1030124
  153. Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems. In Network and Distributed System Security Symposium. Internet Society.
  154. Stephen Smalley and Robert Craig. 2013. Security Enhanced (SE) Android: Bringing Flexible MAC to Android. In Proc. of NDSS 2013. 18.
  155. Procharvester: Fully automated analysis of procfs side-channel leaks on android. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security. 749–763.
  156. Sampath Srinivas and Karthik Lakshminarayanan. 2019. Simplifying identity and access management of your employees, partners, and customers. https://cloud.google.com/blog/products/identity-security/simplifying-identity-and-access-management-of-your-employees-partners-and-customers
  157. Jeff Vander Stoep and Chong Zhang. 2019. Queue the Hardening Enhancements. https://android-developers.googleblog.com/2019/05/queue-hardening-enhancements.html
  158. Andrew S. Tanenbaum and Herbert Bos. 2014. Modern Operating Systems (4th ed.). Prentice Hall Press, Upper Saddle River, NJ, USA.
  159. CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1057–1074. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/tang
  160. Platform Hardening Team. 2020. System hardening in Android 11. https://security.googleblog.com/2020/06/system-hardening-in-android-11.html
  161. Sai Deep Tetali. 2018. Keeping 2 Billion Android devices safe with machine learning. https://android-developers.googleblog.com/2018/05/keeping-2-billion-android-devices-safe.html
  162. Security Metrics for the Android Ecosystem. In Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (Denver, Colorado, USA) (SPSM’15). Association for Computing Machinery, New York NY USA, 87–98. https://doi.org/10.1145/2808117.2808118
  163. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 941–955. https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/tice
  164. Sami Tolvanen. 2017. Hardening the Kernel in Android Oreo. https://android-developers.googleblog.com/2017/08/hardening-kernel-in-android-oreo.html
  165. Sami Tolvanen. 2018. Control Flow Integrity in the Android kernel. https://security.googleblog.com/2018/10/posted-by-sami-tolvanen-staff-software.html
  166. Sami Tolvanen. 2019. Protecting against code reuse in the Linux kernel with Shadow Call Stack. https://security.googleblog.com/2019/10/protecting-against-code-reuse-in-linux_30.html
  167. Resolving the predicament of android custom permissions. In Network and Distributed Systems Security (NDSS) Symposium.
  168. Draco: A system for uniform and fine-grained access control for web code on android. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 104–115.
  169. See no evil: phishing for permissions with false transparency. In n 29th USENIX Security Symposium (USENIX Security 20). 415–432.
  170. Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. ACM Press, 1675–1689. https://doi.org/10.1145/2976749.2978406
  171. Jeff Vander Stoep. 2015. Ioctl Command Whitelisting in SELinux. http://kernsec.org/files/lss2015/vanderstoep.pdf Linux Security Summit.
  172. Jeff Vander Stoep. 2016. Android: Protecting the Kernel. https://events.static.linuxfound.org/sites/events/files/slides/Android-%20protecting%20the%20kernel.pdf Linux Security Summit.
  173. Jeff Vander Stoep. 2017. Shut the HAL up. https://android-developers.googleblog.com/2017/07/shut-hal-up.html
  174. Jeff Vander Stoep. 2022. Memory Safe Languages in Android 13. https://security.googleblog.com/2022/12/memory-safe-languages-in-android-13.html
  175. Jeff Vander Stoep and Stephen Hines. 2021. Rust in the Android platform. https://security.googleblog.com/2021/04/rust-in-android-platform.html
  176. Jeff Vander Stoep and Sami Tolvanen. 2018. Year in Review: Android Kernel Security. https://events.linuxfoundation.org/wp-content/uploads/2017/11/LSS2018.pdf Linux Security Summit.
  177. Peter Visontay and Bessie Jiang. 2021. Making permissions auto-reset available to billions more devices. https://android-developers.googleblog.com/2021/09/making-permissions-auto-reset-available.html
  178. W3C. [n.d.]. Web Authentication: An API for accessing Public Key Credentials. https://webauthn.io/
  179. Andrew Walbran. 2023. Bare-metal Rust in Android. https://security.googleblog.com/2023/10/bare-metal-rust-in-android.html
  180. R. Watson. 2012. New approaches to operatng system security extensibility. Technical Report UCAM-CL-TR-818. Cambridge University. http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-818.pdf
  181. Android Permissions Remystified: A Field Study on Contextual Integrity. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 499–514. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wijesekera
  182. Linux Kernel Security Subsystem Wiki. 2019. Exploit Methods/Userspace execution. https://kernsec.org/wiki/index.php/Exploit_Methods/Userspace_execution
  183. Shawn Willden. 2018. Insider Attack Resistance. https://android-developers.googleblog.com/2018/05/insider-attack-resistance.html
  184. Amy Wilson. 2021. Android 12 simplifies security for work devices. https://blog.google/products/android-enterprise/android-12-developer-preview/
  185. Xiaowen Xin. 2018. Titan M makes Pixel 3 our most secure phone yet. https://blog.google/products/pixel/titan-m-makes-pixel-3-our-most-secure-phone-yet/
  186. Treble: Fast Software Updates by Creating an Equilibrium in an Active Software Ecosystem of Globally Distributed Stakeholders. ACM Trans. Embed. Comput. Syst. 18, 5s, Article 104 (Oct. 2019), 23 pages. https://doi.org/10.1145/3358237
  187. Privacy-preserving features in the Mobile Driving License. https://security.googleblog.com/2020/10/privacy-preserving-features-in-mobile.html
  188. Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (Berlin, Germany) (CCS ’13). ACM, New York, NY, USA, 611–622. https://doi.org/10.1145/2508859.2516689
Citations (60)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com
Youtube Logo Streamline Icon: https://streamlinehq.com

HackerNews