skip to main content
10.1145/3213344.3213350acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article
Public Access

Duvel: Enabling Context-driven, Multi-profile Apps on Android through Storage Sandboxing

Published: 10 June 2018 Publication History

Abstract

We present a novel technique to achieve a dynamic, context-driven, multiple-profile manager for individual apps on stock Android. Our system allows users to use a single app with any number of accounts, allows incognito modes for every app, and allows a context-driven dynamic switching between the profiles (e.g., based on geolocation). Our technique achieves this by creating a sandboxed storage environment within each app through byte-code instrumentation. This allows for a clean separation of profile specific data and allows users to run personal and business accounts on the same phone, or sandbox an app in incognito mode without sharing any data between them. We present many more use cases where our solution can be used to improve user experience on mobile systems. In contrast to many of the existing solutions, our solution eliminates any modifications to the platform, does not require any special SDK to develop apps, and can use a context-driven policy to dynamically switch between profiles. We realize a storage sandbox environment called Duvel on Android, based on our previous work BlueMountain, and show how Duvel can enable using multiple accounts and incognito mode in popular apps.

References

[1]
Paarijaat Aditya, Viktor Erdélyi, Matthew Lentz, Elaine Shi, Bobby Bhattacharjee, and Peter Druschel. 2014. EnCore: Private, Context-based Communication for Mobile Social Apps. In Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '14). ACM, New York, NY, USA, 135--148.
[2]
Jeremy Andrus, Christoffer Dall, Alexander Van't Hof, Oren Laadan, and Jason Nieh. 2011. Cells: a virtual mobile smartphone architecture. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles. ACM, 173--187.
[3]
Michael Backes, Sven Bugiel, Christian Hammer, Oliver Schranz, and Philipp Von Styp-Rekowsky. 2015. Boxify: Full-fledged App Sandboxing for Stock Android. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15). USENIX Association, Berkeley, CA, USA, 691--706. http://dl.acm.org/citation.cfm?id=2831143.2831187
[4]
Matthias Baldauf, Schahram Dustdar, and Florian Rosenberg. 2007. A survey on context-aware systems. International Journal of Ad Hoc and Ubiquitous Computing 2, 4 (2007), 263--277.
[5]
Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, and Giovanni Vigna. 2015. NJAS: Sandboxing Unmodified Applications in Non-rooted Devices Running Stock Android. In Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '15). ACM, New York, NY, USA, 27--38.
[6]
Sharath Chandrashekhara, Taeyeon Ki, Kyungho Jeon, Karthik Dantu, and Steven Y. Ko. 2017. BlueMountain: An Architecture for Customized Data Management on Mobile Systems. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (MobiCom '17). ACM, New York, NY, USA, 396--408.
[7]
Wenzhi Chen, Lei Xu, Guoxi Li, and Yang Xiang. 2015. A lightweight virtualization solution for Android devices. IEEE Trans. Comput. 64, 10 (2015), 2741--2751.
[8]
Citrix. 2017. XenMobile. (Jan 2017). Retrieved July 10, 2017 from https://www.citrix.com/products/xenmobile/
[9]
Benjamin Davis, Ben Sanders, Armen Khodaverdian, and Hao Chen. 2012. I-ARM-Droid: A Rewriting Framework for In-App Reference Monitors for Android Applications. In Proceedings of the IEEE Mobile Security Technologies (MoST '12).
[10]
Google. 2017. Android for Work. (Jan 2017). Retrieved July 10, 2017 from https://www.android.com/work
[11]
Christopher K Hess and Roy H Campbell. 2003. A context-aware data management system for ubiquitous computing applications. In Distributed Computing Systems, 2003. Proceedings. 23rd International Conference on. IEEE, 294--301.
[12]
Sharat Khungar and Jukka Riekki. 2004. A context based storage for ubiquitous computing applications. In Proceedings of the 2nd European Union symposium on Ambient intelligence. ACM, 55--58.
[13]
Taeyeon Ki, Alexander Simeonov, Bhavika Pravin Jain, Chang Min Park, Keshav Sharma, Karthik Dantu, Steven Y. Ko, and Lukasz Ziarek. 2017. Rep-tor: Enabling API Virtualization on Android for Platform Openness. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys '17). ACM, New York, NY, USA, 399--412.
[14]
Temitope Oluwafemi, Earlence Fernandes, Oriana Riva, Franziska Roesner, Suman Nath, and Tadayoshi Kohno. 2014. Per-App Profiles with AppFork: The Security of Two Phones with the Convenience of One. Technical Report. https://www.microsoft.com/en-us/research/publication/per-app-profiles-appfork-security-two-phones-convenience-one/
[15]
Lenin Ravindranath, Sharad Agarwal, Jitendra Padhye, and Chris Riederer. 2014. Procrastinator: Pacing mobile apps' usage of the network. In Proc. ACM MobiSys.
[16]
Parallel Space. 2017. Parallel App: Run Multiple Social and Game Accounts in Your Phone Simultaneously. (Jan 2017). Retrieved April 6, 2018 from http://parallel-app.com/
[17]
Patrick Stuedi, Iqbal Mohomed, and Doug Terry. 2010. Wherestore: Location-based data storage for mobile devices interacting with the cloud. In Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond. ACM, 1.
[18]
VmWare. 2017. Air-Watch Enterprise mobility platform. (Jan 2017). Retrieved July 10, 2017 from https://www.air-watch.com/

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
EdgeSys'18: Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking
June 2018
65 pages
ISBN:9781450358378
DOI:10.1145/3213344
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 June 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. BYOD
  2. Bytecode instrumentation
  3. Data management
  4. Enterprise Mobility Management
  5. Mobile systems

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

MobiSys '18
Sponsor:

Acceptance Rates

Overall Acceptance Rate 10 of 23 submissions, 43%

Upcoming Conference

EuroSys '25
Twentieth European Conference on Computer Systems
March 30 - April 3, 2025
Rotterdam , Netherlands

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 274
    Total Downloads
  • Downloads (Last 12 months)67
  • Downloads (Last 6 weeks)12
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media