skip to main content
10.1145/2664243.2664245acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Design and implementation of an Android host-based intrusion prevention system

Published:08 December 2014Publication History

ABSTRACT

Android has a dominating share in the mobile market and there is a significant rise of mobile malware targeting Android devices. Android malware accounted for 97% of all mobile threats in 2013 [26]. To protect smartphones and prevent privacy leakage, companies have implemented various host-based intrusion prevention systems (HIPS) on their Android devices. In this paper, we first analyze the implementations, strengths and weaknesses of three popular HIPS architectures. We demonstrate a severe loophole and weakness of an existing popular HIPS product in which hackers can readily exploit. Then we present a design and implementation of a secure and extensible HIPS platform---"Patronus." Patronus not only provides intrusion prevention without the need to modify the Android system, it can also dynamically detect existing malware based on runtime information. We propose a two-phase dynamic detection algorithm for detecting running malware. Our experiments show that Patronus can prevent the intrusive behaviors efficiently and detect malware accurately with a very low performance overhead and power consumption.

References

  1. 360 one click root. http://shuaji.360.cn/root/index.html.Google ScholarGoogle Scholar
  2. Android Malware Genome Project. http://malgenomeproject.org.Google ScholarGoogle Scholar
  3. APKfuscator. https://github.com/strazzere/APKfuscator.Google ScholarGoogle Scholar
  4. Apktool. https://code.google.com/p/android-apktool/.Google ScholarGoogle Scholar
  5. App Shield. http://www.wandoujia.com/apps/com.gmail.exathink.appshield.Google ScholarGoogle Scholar
  6. Aurora Softworks quadrant standard edition. https://play.google.com/store/apps/details?id=com. aurorasoftworks.quadrant.ui.standard.Google ScholarGoogle Scholar
  7. cyanogenmod. http://www.cyanogenmod.org.Google ScholarGoogle Scholar
  8. DroidBox. https://code.google.com/p/droidbox/.Google ScholarGoogle Scholar
  9. Jinshan mobile duba. http://m.duba.net/.Google ScholarGoogle Scholar
  10. Lbe secrity guard. http://www.lbesec.com/.Google ScholarGoogle Scholar
  11. mobile malware mini dump. http://contagiominidump.blogspot.com/.Google ScholarGoogle Scholar
  12. monkey. http://developer.android.com/tools/help/monkey.html.Google ScholarGoogle Scholar
  13. Qihoo 360 mobile guard. http://shouji.360.cn/.Google ScholarGoogle Scholar
  14. smali/baksmali. https://code.google.com/p/smali/.Google ScholarGoogle Scholar
  15. K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie. Pscout: analyzing the android permission specification. In CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A.-R. Sadeghi, and B. Shastry. Towards taming privilege-escalation attacks on android. In NDSS, 2012.Google ScholarGoogle Scholar
  17. S. Bugiel, S. Heuser, and A.-R. Sadeghi. Flexible and fine-grained mandatory access control on android for diverse security and privacy policies. In USENIX Security, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani. CrowDroid: behavior-based malware detection system for android. In Proc. of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Chakradeo, B. Reaves, P. Traynor, and W. Enck. MAST: triage for market-scale mobile malware analysis. In ACM WiSec, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In MobiSys, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Davis and H. Chen. RetroSkeleton: retrofitting android apps. In MobiSys, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Dietz, S. Shekhar, Y. Pisetsky, A. Shu, and D. S. Wallach. QUIRE: Lightweight provenance for smart phone operating systems. In USENIX Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting privacy leaks in ios applications. In NDSS, 2011.Google ScholarGoogle Scholar
  24. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A study of android application security. In USENIX Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. F-Secure. Threat report h2 2013.Google ScholarGoogle Scholar
  27. A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission re-delegation: attacks and defenses. In USENIX Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. Forristal. Android: One root to own them all. In Blackhat USA 2013, 2013.Google ScholarGoogle Scholar
  30. Google. Platform versions. http://developer.android.com/about/dashboards/index.html.Google ScholarGoogle Scholar
  31. M. Grace, Y. Zhou, Z. Wang, and X. Jiang. Systematic detection of capability leaks in stock android smartphones. In NDSS, 2012.Google ScholarGoogle Scholar
  32. M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. RiskRanker: scalable and accurate zero-day android malware detection. In MobiSys, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi. Unsafe exposure analysis of mobile in-app advertisements. In WiSec, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. N. Harbour. Win at reversing: Api tracing and sandboxing through inline hooking. In DEFCON, 2009.Google ScholarGoogle Scholar
  35. IDC. Apple cedes market share in smartphone operating system market as android surges and windows phone gains. http://www.idc.com/getdoc.jsp?containerId=prUS24257413.Google ScholarGoogle Scholar
  36. L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. CHEX: statically vetting android apps for component hijacking vulnerabilities. In CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. T. Luo, H. Hao, W. Du, Y. Wang, and H. Yin. Attacks on webview in the android system. In ACSAC, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. W. Luo, S. Xu, and X. Jiang. Real-time detection and prevention of android sms permission abuses. In Proc. of the first international workshop on Security in embedded systems and smartphones, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. McAfee Labs. McAfee threats report: Second quarter 2013. Technical report, McAfee Labs, 2013.Google ScholarGoogle Scholar
  40. C. Mulliner. Android DDI: Introduction to dynamic dalvik instrumentation. In The 11th Annual HITB Security Conference in ASIA, 2013.Google ScholarGoogle Scholar
  41. C. Mulliner, J. Oberheide, W. Robertson, and E. Kirda. Patchdroid: scalable third-party security patches for android devices. In ACSAC, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. N. Nethercote and J. Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM Sigplan Notices. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. Internet Society, 2005.Google ScholarGoogle Scholar
  44. P. Olson. Your smartphone is hackers' next big target. http://edition.cnn.com/2013/08/26/opinion/olson-mobile-hackers, August 2013.Google ScholarGoogle Scholar
  45. A. Police. App Ops: Android 4.3's hidden app permission manager, control permissions for individual apps.Google ScholarGoogle Scholar
  46. N. Provos. Improving host security with system call policies. In USENIX Security, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. V. Rastogi, Y. Chen, and W. Enck. AppsPlayground: automatic security analysis of smartphone applications. In CODASPY, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. V. Rastogi, Y. Chen, and X. Jiang. DroidChameleon: evaluating android anti-malware against transformation attacks. In ASIACCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. G. Russello, A. B. Jimenez, H. Naderi, and W. van der Mark. Firedroid: hardening security in almost-stock android. In ACSAC, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. T. Strazzere. Dex education: Practicing safe dex. In Blackhat USA 2012, 2012.Google ScholarGoogle Scholar
  51. T. Wang, K. Lu, L. Lu, S. Chung, and W. Lee. Jekyll on iOS: when benign apps become evil. In USENIX Security, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. L. Wu, M. Grace, Y. Zhou, C. Wu, and X. Jiang. The impact of vendor customizations on android security. In CCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. xda-developers. PDroid. http://forum.xda-developers.com/showthread.php?t=1357056.Google ScholarGoogle Scholar
  54. R. Xu, H. Saïdi, and R. Anderson. Aurasium: practical policy enforcement for android applications. In USENIX Security, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. L. K. Yan and H. Yin. DroidScope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In USENIX Security, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang. AppIntent: Analyzing sensitive data transmission in android for privacy leakage detection. In CCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. Wang, and B. Zang. Vetting undesirable behaviors in android apps with permission use analysis. In CCS, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, and W. Zou. Smartdroid: an automatic system for revealing ui-based trigger conditions in android applications. In Proc. of the second ACM workshop on Security and privacy in smartphones and mobile devices, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. M. Zheng, P. P. C. Lee, and J. C. S. Lui. ADAM: an automatic and extensible platform to stress test android anti-virus systems. In DIMVA, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. M. Zheng, M. Sun, and J. Lui. DroidRay: a security evaluation system for customized android firmwares. In ASIACCS, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. M. Zheng, M. Sun, and J. C. S. Lui. DroidAnalytics: A signature based analytic system to collect, extract, analyze and associate android malware. In TrustCom, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party android marketplaces. In Proc. of the second ACM conference on Data and Application Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In IEEE Symposium on Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Y. Zhou and X. Jiang. Detecting passive content leaks and pollution in android applications. In NDSS, 2013.Google ScholarGoogle Scholar
  65. Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In NDSS, 2012.Google ScholarGoogle Scholar
  1. Design and implementation of an Android host-based intrusion prevention system

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ACSAC '14: Proceedings of the 30th Annual Computer Security Applications Conference
      December 2014
      492 pages
      ISBN:9781450330053
      DOI:10.1145/2664243

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 December 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate104of497submissions,21%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader