Seminar • Cryptography, Security, and Privacy (CrySP) — Precise and Logical Modeling of Android Access Control MechanismExport this event to calendar

Monday, February 4, 2019 — 10:30 AM EST

Yousra Aafer, Postdoctoral Researcher
Department of Computer Science, Purdue University

The pervasiveness of mobile devices (e.g., smartphones, guidance systems, and smart watches) mounts great pressure on today's mobile security infrastructures. Particularly, with the threat of Android malware and Potentially Harmful Apps on the rise, there is a strong demand for detecting security vulnerabilities, especially those related to access control anomalies. Due to the highly complex and diverse nature of Android access control implementation, existing efforts produce a significant number of false alarms. 

In this talk, I will present my two recent efforts on evaluating Android access control mechanism. The first effort proposes and implements a new approach for automatically detecting framework-level access control discrepancies. The solution models and normalizes diverse Android security checks to a canonical form, allowing a precise comparison of access control enforcement for exploitable inconsistencies detection. I will present evaluation results demonstrating the effectiveness of the proposed framework — through analyzing 12 Android images, the tool uncovered a substantial number of inconsistencies, leading to the discovery of 28 actual exploits.

My second effort aims to help developers avoid access control vulnerabilities through providing an accurate protection specification for APIs. To precisely capture the co-relations between enforced API-level security checks, the approach derives Android protection specification in a path-sensitive fashion, using a novel graph abstraction technique. I will further showcase how security researchers can leverage the derived specifications to tackle security issues through logical satisfiability reasoning. Lastly, I will present comparison data with the state-of-the-art static solutions, which highlight the significance of the proposed approach. A breakdown of the generated API protection specification for 8 different Android codebases reveals that 41% of API's protections cannot be correctly modeled without the proposed technique.


Bio: Yousra Aafer is a postdoctoral researcher in the Department of Computer Science at Purdue University. Her research interests span the areas of System Security and Design, and particularly tackles emerging threats of Mobile and Smart Systems. She completed her Ph.D. in Computer Engineering from Syracuse University while focusing on evaluating security aspects of Android vendor-customization. Her discoveries directly benefited mobile vendors and led to publications on top-tier security venues. She is an elected member of the ACM's Future of Computing Academy.

Location 
DC - William G. Davis Computer Research Centre
1304
200 University Avenue West

Waterloo, ON N2L 3G1
Canada

S M T W T F S
27
28
29
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
  1. 2019 (239)
    1. December (6)
    2. November (24)
    3. October (16)
    4. September (20)
    5. August (18)
    6. July (12)
    7. June (23)
    8. May (23)
    9. April (32)
    10. March (25)
    11. February (16)
    12. January (24)
  2. 2018 (220)
    1. December (16)
    2. November (19)
    3. October (26)
    4. September (22)
    5. August (17)
    6. July (20)
    7. June (13)
    8. May (25)
    9. April (34)
    10. March (24)
    11. February (3)
    12. January (1)
  3. 2017 (36)
  4. 2016 (21)
  5. 2015 (36)
  6. 2014 (33)
  7. 2013 (23)
  8. 2012 (4)
  9. 2011 (1)
  10. 2010 (1)
  11. 2009 (1)
  12. 2008 (1)