Skip to main content

2017 | OriginalPaper | Buchkapitel

Towards Self-aware Approach for Mobile Devices Security

verfasst von : Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho

Erschienen in: Computer Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We present conceptual design of self-aware security for mobile devices. The design is envisioned to bring self-awareness into the mobile devices security for optimal protection by regulating application activities. The proposed design contains three subsystems: meta-level enables self-awareness, extended meta-level extends protections to the base-level components through security mechanisms and base-level comprises of resources that are essential for applications execution. The presented design enables cooperation among security mechanisms (such as access control and anti-virus) as well as with self-aware agent. The cooperation is intended for better understanding of application activities that leads to recognizing threat patterns in advance. When a threat is predicted/detected, the self-aware agent communicates with the security mechanisms so that they can take the necessary actions. The design of the security mechanisms are elaborated using access control system and anti-virus as example cases.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
8.
Zurück zum Zitat Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: a new android evolution to mitigate privilege escalation attacks. Technische Universität Darmstadt, Technical report TR-2011-04 (2011) Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: a new android evolution to mitigate privilege escalation attacks. Technische Universität Darmstadt, Technical report TR-2011-04 (2011)
9.
Zurück zum Zitat Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)CrossRef Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 5 (2014)CrossRef
10.
Zurück zum Zitat Heuser, S., Nadkarni, A., Enck, W., Sadeghi, A.-R.: ASM: a programmable interface for extending android security. In: Proceedings of 23rd USENIX Security Symposium (2014) Heuser, S., Nadkarni, A., Enck, W., Sadeghi, A.-R.: ASM: a programmable interface for extending android security. In: Proceedings of 23rd USENIX Security Symposium (2014)
11.
Zurück zum Zitat Wang, X., Sun, K., Wang, Y., Jing, J.: Deepdroid: dynamically enforcing enterprise policy on android devices. In: Proceedings of 22nd Annual Network and Distributed System Security Symposium (NDSS 2015). The Internet Society (2015) Wang, X., Sun, K., Wang, Y., Jing, J.: Deepdroid: dynamically enforcing enterprise policy on android devices. In: Proceedings of 22nd Annual Network and Distributed System Security Symposium (NDSS 2015). The Internet Society (2015)
12.
Zurück zum Zitat Conti, M., Crispo, B., Fernandes, E., Zhauniarovich, Y.: Crêpe: a system for enforcing fine-grained context-related policies on android. IEEE Trans. Inf. Forensics Secur. 7(5), 1426–1438 (2012)CrossRef Conti, M., Crispo, B., Fernandes, E., Zhauniarovich, Y.: Crêpe: a system for enforcing fine-grained context-related policies on android. IEEE Trans. Inf. Forensics Secur. 7(5), 1426–1438 (2012)CrossRef
14.
Zurück zum Zitat Wang, H., Xi, M., Liu, J., Chen, C.: Transmitting IPv6 packets over Bluetooth low energy based on BlueZ. In: 2013 15th International Conference on Advanced Communications Technology (ICACT), PyeongChang, pp. 72–77 (2013) Wang, H., Xi, M., Liu, J., Chen, C.: Transmitting IPv6 packets over Bluetooth low energy based on BlueZ. In: 2013 15th International Conference on Advanced Communications Technology (ICACT), PyeongChang, pp. 72–77 (2013)
15.
Zurück zum Zitat Andersen, M.P., Fierro, G., Culler, D.E.: System design for a synergistic, low power Mote/BLE embedded platform. In: 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, pp. 1–12 (2016) Andersen, M.P., Fierro, G., Culler, D.E.: System design for a synergistic, low power Mote/BLE embedded platform. In: 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Vienna, pp. 1–12 (2016)
16.
Zurück zum Zitat Skorin-Kapov, L., Pripužić, K., Marjanović, M., Antonić, A., Žarko, I.P.: Energy efficient and quality-driven continuous sensor management for mobile IoT applications. In: 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, pp. 397–406 (2014) Skorin-Kapov, L., Pripužić, K., Marjanović, M., Antonić, A., Žarko, I.P.: Energy efficient and quality-driven continuous sensor management for mobile IoT applications. In: 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, pp. 397–406 (2014)
17.
Zurück zum Zitat Angelopoulos, C.M., Evangelatos, O., Nikoletseas, S., Raptis, T.P., Rolim, J.D.P., Veroutis, K.: A user-enabled testbed architecture with mobile crowdsensing support for smart, green buildings. In: 2015 IEEE International Conference on Communications (ICC), London, pp. 573–578 (2015) Angelopoulos, C.M., Evangelatos, O., Nikoletseas, S., Raptis, T.P., Rolim, J.D.P., Veroutis, K.: A user-enabled testbed architecture with mobile crowdsensing support for smart, green buildings. In: 2015 IEEE International Conference on Communications (ICC), London, pp. 573–578 (2015)
18.
Zurück zum Zitat Zhao, D., Ma, H., Liu, L.: Frugal online incentive mechanisms for mobile crowd sensing. IEEE Trans. Veh. Technol. PP(99), 1 (2016) Zhao, D., Ma, H., Liu, L.: Frugal online incentive mechanisms for mobile crowd sensing. IEEE Trans. Veh. Technol. PP(99), 1 (2016)
19.
Zurück zum Zitat Shu, L., Chen, Y., Huo, Z., Bergmann, N., Wang, L.: When mobile crowd sensing meets traditional industry. IEEE Access PP(99), 1 (2017)CrossRef Shu, L., Chen, Y., Huo, Z., Bergmann, N., Wang, L.: When mobile crowd sensing meets traditional industry. IEEE Access PP(99), 1 (2017)CrossRef
20.
Zurück zum Zitat Guang, L., Nigussie, E., Rantala, P., Isoaho, J., Tenhunen, H.: Hierarchical agent monitoring design approach towards self-aware parallel systems-on-chip. ACM Trans. Embedded Comput. Syst. (TECS) 9(3), 1–26 (2010)CrossRef Guang, L., Nigussie, E., Rantala, P., Isoaho, J., Tenhunen, H.: Hierarchical agent monitoring design approach towards self-aware parallel systems-on-chip. ACM Trans. Embedded Comput. Syst. (TECS) 9(3), 1–26 (2010)CrossRef
21.
Zurück zum Zitat Isoaho, J., Virtanen, S., Tenhunen, H.: Current challenges in embedded communication systems. In: Innovations in Embedded and Real-Time Systems Engineering for Communication. IGI Global (2012) Isoaho, J., Virtanen, S., Tenhunen, H.: Current challenges in embedded communication systems. In: Innovations in Embedded and Real-Time Systems Engineering for Communication. IGI Global (2012)
22.
Zurück zum Zitat Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X., Gunter, C.A., Nahrstedt, K.: Identity, location, disease and more: inferring your secrets from android public resources. In: 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1017–1028. ACM (2013) Zhou, X., Demetriou, S., He, D., Naveed, M., Pan, X., Wang, X., Gunter, C.A., Nahrstedt, K.: Identity, location, disease and more: inferring your secrets from android public resources. In: 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 1017–1028. ACM (2013)
23.
Zurück zum Zitat Narain, S., Vo-Huu, T.D., Block, K., Noubir, G.: Inferring user routes and locations using zero-permission mobile sensors. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 397–413. IEEE (2016) Narain, S., Vo-Huu, T.D., Block, K., Noubir, G.: Inferring user routes and locations using zero-permission mobile sensors. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 397–413. IEEE (2016)
24.
Zurück zum Zitat Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95–109. IEEE (2012) Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95–109. IEEE (2012)
29.
Zurück zum Zitat Weyns, D., Malek, S., Andersson, J.: FORMS: unifying reference model for formal specification of distributed self-adaptive systems. ACM Trans. Auton. Adaptive Syst. 7(1), 61 (2012) Weyns, D., Malek, S., Andersson, J.: FORMS: unifying reference model for formal specification of distributed self-adaptive systems. ACM Trans. Auton. Adaptive Syst. 7(1), 61 (2012)
31.
Zurück zum Zitat Hoffmann, H., Maggio, M., Santambrogio, M.D., Leva, A., Agarwal, A.: SEEC: a framework for self-aware computing (2010) Hoffmann, H., Maggio, M., Santambrogio, M.D., Leva, A., Agarwal, A.: SEEC: a framework for self-aware computing (2010)
32.
Zurück zum Zitat Bailey, C., Montrieux, L., de Lemos, R., Yu, Y., Wermelinger, M.: Run-time generation, transformation, and verification of access control models for self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2014), pp. 135–144. ACM (2014) Bailey, C., Montrieux, L., de Lemos, R., Yu, Y., Wermelinger, M.: Run-time generation, transformation, and verification of access control models for self-protection. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2014), pp. 135–144. ACM (2014)
33.
Zurück zum Zitat Guo, D.F., Sui, A.F., Shi, Y.J., Hu, J.J., Lin, G.Z., Guo, T.: Behavior classification based self-learning mobile malware detection. J. Comput. 9(4), 851–858 (2014)CrossRef Guo, D.F., Sui, A.F., Shi, Y.J., Hu, J.J., Lin, G.Z., Guo, T.: Behavior classification based self-learning mobile malware detection. J. Comput. 9(4), 851–858 (2014)CrossRef
34.
Zurück zum Zitat Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y.: Mobile malware detection through analysis of deviations in application network behaviour. Comput. Secur. 43, 1–18 (2014)CrossRef Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y.: Mobile malware detection through analysis of deviations in application network behaviour. Comput. Secur. 43, 1–18 (2014)CrossRef
35.
Zurück zum Zitat Li, F., Clarke, N., Papadaki, M., Dowland, P.: Behaviour profiling on mobile devices. In: International Conference on Emerging Security Technologies, Canterbury, pp. 77–82 (2010) Li, F., Clarke, N., Papadaki, M., Dowland, P.: Behaviour profiling on mobile devices. In: International Conference on Emerging Security Technologies, Canterbury, pp. 77–82 (2010)
36.
Zurück zum Zitat Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in Android. J. Parallel Distrib. Comput. 103, 220–31 (2016) Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in Android. J. Parallel Distrib. Comput. 103, 220–31 (2016)
Metadaten
Titel
Towards Self-aware Approach for Mobile Devices Security
verfasst von
Nanda Kumar Thanigaivelan
Ethiopia Nigussie
Seppo Virtanen
Jouni Isoaho
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-65127-9_14