skip to main content
10.1145/1653662.1653691acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On lightweight mobile phone application certification

Published: 09 November 2009 Publication History

Abstract

Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of applications results in a greater chance of installing Trojans and similar malware. In this paper, we propose the Kirin security service for Android, which performs lightweight certification of applications to mitigate malware at install time. Kirin certification uses security rules, which are templates designed to conservatively match undesirable properties in security configuration bundled with applications. We use a variant of security requirements engineering techniques to perform an in-depth security analysis of Android to produce a set of rules that match malware characteristics. In a sample of 311 of the most popular applications downloaded from the official Android Market, Kirin and our rules found 5 applications that implement dangerous functionality and therefore should be installed with extreme caution. Upon close inspection, another five applications asserted dangerous rights, but were within the scope of reasonable functional needs. These results indicate that security configuration bundled with Android applications provides practical means of detecting malware.

References

[1]
AdMob. AdMob Mobile Metrics Report. http://www.admob.com/marketing/pdf/ mobile_metrics_feb_09.pdf, February 2009.
[2]
J. P. Anderson. Computer Security Technology PlanningStudy. Technical Report ESD-TR-73-51, The Mitre Corporation, Air Force Systems Division, Hanscom AFB,Badford, MA, October 1972.
[3]
Apple, Inc. Get Ready for iPhone OS 3.0. http://developer.apple.com/iphone/ program/sdk.html. Accessed April 2009.
[4]
A. Bose, X. Hu, K. G. Shin, and T. Park. BehavioralDetection of Malware on Mobile Handsets. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 225--238, 2008.
[5]
P. Chen, M. Dean, D. Ojoko-Adams, H. Osman, L. Lopez, and N. Xie. System Quality Requirements Engineering (SQUARE) Methodology: Case Study on Asset Management System. Technical Report CMU/SEI-2004-SR-015, Software Engineering Institute, Carnegie Mellon University, December 2004.
[6]
J. Cheng, S. H. Wong, H. Yang, and S. Lu. SmartSiren: Virus Detection and Alert for Smartphones. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 258--271, June 2007.
[7]
L. F. Cranor. P3P: Making Privacy Policies More Useful. IEEE Security&Privacy magazine, 1(6):50--55, November-December 2003.
[8]
D. Dagon, T. Martin, and T. Starner. Mobile Phones as Computing Devices: The Viruses are Coming! IEEE Pervasive Computing, 3(4):11--15, October-December 2004.
[9]
L. Desmet, W. Joosen, F. Massacci, P. Philippaerts, F. Piessens, I. Siahaan, and D. Vanoverberghe. Security-by-contract on the .NET platform. Information Security Technical Report, 13(1):25--32, January 2008.
[10]
W. Enck, M. Ongtang, and P. McDaniel. Mitigating AndroidSoftware Misuse Before It Happens. Technical Report NAS-TR-0094-2008, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, November 2008.
[11]
W. Enck, M. Ongtang, and P. McDaniel. Understanding Android Security. IEEE Security&Privacy Magazine, 7(1):50--57, January/February 2009.
[12]
F-Secure Corporation. Virus Description: Cabir. http://www.f-secure.com/v-descs/cabir.shtml. Accessed March 2009.
[13]
F-Secure Corporation. Virus Description: Cardblock.A. http://www.f-secure.com/v-descs/cardblock_a.shtml. Accessed March 2009.
[14]
F-Secure Corporation. Virus Description: Commwarrior. http://www.f-secure.com/v-descs/commwarrior.shtml. Accessed March 2009.
[15]
F-Secure Corporation. Virus Description: Drever.A. http://www.f-secure.com/v-descs/drever_ a.shtml. Accessed March 2009.
[16]
F-Secure Corporation. Virus Description: Lasco.A. http://www.f-secure.com/v-descs/lasco_a.shtml. Accessed March 2009.
[17]
F-Secure Corporation. Virus Description: Pbstealer.A. http://www.f-secure.com/v-descs/pbstealer_a.shtml. Accessed March 2009.
[18]
F-Secure Corporation. Virus Description: Skulls.A. http://www.f-secure.com/v-descs/skulls.shtml. Accessed March 2009.
[19]
F-Secure Corporation. Virus Description: Viver.A. http://www.f-secure.com/v-descs/trojan_ symbos_viver_a.shtml. Accessed March 2009.
[20]
F-Secure Corporation. Virus Description: Worm:SymbOS/Yxe.A. http://www.f-secure.com/v-descs/worm_symbos_yxe.shtml. Accessed March 2009.
[21]
F-Secure Corporation. Telia Sonera Finland and F-Secure united against mobile viruses: Cabir spreads at the World Championships. http://www.f-secure.com/en_EMEA/about-us/pressroom/news/2005/fs_news_20050811_1_eng.html, August 2005.
[22]
F-Secure Corporation. Just because it's Signed doesn't meanit isn't spying on you. http://www.f-secure.com/ weblog/archives/00001190.html, May 2007.
[23]
C. Fleizach, M. Liljenstam, P. Johansson, G. M. Moelker, and A. Mehes. Can you Infect Me Now? Malware Propagation in Mobile Phone Networks. In Proceedings ofthe ACM Workshop On Rapid Malcode (WORM), pages 61--68, Novermber 2007.
[24]
Georgia Tech Information Security Center. Emerging Cyber Threats Report for 2009. http://www.gtisc.gatech.edu/pdf/CyberThreatsReport2009.pdf, October 2008.
[25]
C. Guo, H. J. Wang, and W. Zhu. Smart-Phone Attacks and Defenses. In Third Workshop on Hot Topics in Networks (HotNets), November 2004.
[26]
C. B. Haley, J. D. Moffett, R. Laney, and B. Nuseibeh. A framework for security requirements engineering. In SESS'06: Proceedings of the 2006 international workshop on Software engineering for secure systems, pages 35--42, 2006.
[27]
D. Hatebur, M. Heisel, and H. Schmidt. A Pattern System for Security Requirements Engineering. In ARES'07: Proceedings of the The Second International Conference on Availability, Reliability and Security, pages 356--365, 2007.
[28]
M. Hypponen. Mobile Malware. USENIX Security Symposium, August 2007. Invited Talk.
[29]
Independent Security Evaluators. Exploiting Android. http://securityevaluators.com/content/ case-studies/android/index.jsp.
[30]
I. Ion, B. Dragovic, and B. Crispo. Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. In Proceedings of the Annual ComputerSecurity Applications Conference (ACSAC), December 2007.
[31]
ISO/IEC 15408--1 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model, October 2005.
[32]
S. Lipner and M. Howard. The Trustworthy Computing Security Development Lifecycle. http://msdn.microsoft.com/en-us/library/ ms995349.aspx, March 2005.
[33]
J. McDermott and C. Fox. Using Abuse Case Models for Security Requirements Analysis. In Proceedings of the 15th Annual Computer Security Applications Conference, 1999.
[34]
N. R. Mead. How To Compare the Security QualityRequirements Engineering (SQUARE) Method with Other Methods. Technical Report CMU/SEI-2007-TN-021,Software Engineering Institute, Carnegie Mellon University, August 2007.
[35]
D. Mellado, E. Fernandez-Medina, and M. Piattini. Applying a Security Requirements Engineering Process. LNCS: Computer Security -- ESORICS 2006, 4189/2006:192-206, September 2006.
[36]
D. Mellado, E. Fernández-Medina, and M. Piattini. Acommon criteria based security requirements engineering process for the development of secure information systems. Computer Standards&Interfaces, 29(2):244--253, 2007.
[37]
J. D. Moffett, C. B. Haley, and B. Nuseibeh. Core Security Requirements Artefacts. Technical report, Open University, UK, 2004.
[38]
D. Muthukumaran, A. Sawani, J. Schiffman, B. M. Jung, and T. Jaeger. Measuring Integrity on Mobile Phone Systems. In Proceedings of the ACM Symposium on Access Control Models and Technologies, pages 155--164, June 2008.
[39]
G. C. Necula. Proof-Carrying Code. In Proceedings of the Symposium on Principles of Programming Languages (POPL), pages 106--119, Jan. 1997.
[40]
Open Web Application Security Project (OWASP) Foundation. CLASP (Comprehensive, Lightweight Application Security Process) Project. http://www.owasp.org/index.php/OWASP_CLASP_Project, March 2009.
[41]
Oracle. Oracle Software Security Assurance. http://www.oracle.com/security/ software-security-assurance.html, April 2009.
[42]
M. Polychronakis, P. Mavrommatis, and N. Provos. GhostTurns Zombie: Exploring the Life Cycle of Web-based Malware. In Proceedings of the USENIX Workshop on Large-Scale and Emergent Threats (LEET), April 2008.
[43]
S. Rueda, D. King, and T. Jaeger. Verifying Compliance of Trusted Programs. In Proceedings of the USENIX Security Symposium, pages 321--334, August 2008.
[44]
A.-D. Schmidt, F. Peters, F. Lamour, C. Scheel, S. A.Camtepe, and S. Albayrak. Monitoring Smartphones for Anomaly Detection. Mobile Networks and Applications, 14(1):92--106, February 2009.
[45]
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson,F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. Wiley, 2009.
[46]
D. Shin, J. Ahn, and C. Shim. Progressive Multi Gray-Leveling: A Voice Spam Protection Algorithm. IEEE Network, 20(5):18--24, September-October 2006.
[47]
G. Sindre and A. L. Opdahl. Eliciting security requirements with misuse cases. LNCS: Requirements Engineering, pages 34--44, June 2004.
[48]
N. Yoshioka, H. Washizaki, and K. Maruyama. A survey onsecurity patterns. Progress in Informatics, Special issue: The future of software engineering for security and privacy, 5:35--47, October 2008.
[49]
X. Zhang, O. Aciic,mez, and J.-P. Seifert. A Trusted MobilePhone Reference Architecture via Secure Kernel. In Proceedings of the ACM workshop on Scalable Trusted Computing, pages 7--14, November 2007.

Cited By

View all

Index Terms

  1. On lightweight mobile phone application certification

    Recommendations

    Reviews

    Edgar R. Weippl

    Enck, Ongtang, and McDaniel present a methodology for certifying mobile phone applications during the installation process. During the installation process, the application is classified according to its behavior and possibly suspicious activities-for example, accessing a global positioning system (GPS) location and sending it over the Internet. Android's standard security decisions are primarily based on the application's packet manifest-permissions may or may not be granted to applications, as requested. The authors defined the security rules using their Kirin Security Language; for instance, a rule may state that a certain application must not be debugged by another application. To validate their method, they analyzed existing applications and found that several applications, such as GPS-tracking programs, violate some of their rules and are thus classified as potentially dangerous. If installed in secret, tracking GPS locations and sending them over the Internet can be maliciously used for spying. The researchers also discovered some security flaws; for instance, in their early versions, Android applications created short message service (SMS) text messages that appeared to have been received over the cellular network when in fact they had been created locally. In summary, the authors present three main ideas in this paper: they describe a methodology for implementing additional security features in Android; they show how applications can be dynamically certified; and they provide and validate some rules that may be used to characterize the behavior of applications on mobile devices. This paper is for readers who are interested in "practical mobile phone security." Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '09: Proceedings of the 16th ACM conference on Computer and communications security
    November 2009
    664 pages
    ISBN:9781605588940
    DOI:10.1145/1653662
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 November 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. android
    2. malware
    3. mobile phone security

    Qualifiers

    • Research-article

    Conference

    CCS '09
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)66
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 26 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media