Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications

Mobile systems are generally composed of three layers of software: application layer where third-party applications are installed, framework layer where Application Programming Interfaces (APIs) are exposed, and kernel layer where low-level system operations are executed. In this dissertation, we fo...

Full description

Saved in:
Bibliographic Details
Main Author: SU, Mon Kywe
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
Online Access:https://ink.library.smu.edu.sg/etd_coll_all/3
https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1004&context=etd_coll_all
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.etd_coll_all-1004
record_format dspace
spelling sg-smu-ink.etd_coll_all-10042019-07-11T07:22:41Z Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications SU, Mon Kywe Mobile systems are generally composed of three layers of software: application layer where third-party applications are installed, framework layer where Application Programming Interfaces (APIs) are exposed, and kernel layer where low-level system operations are executed. In this dissertation, we focus on security and vulnerability analysis of framework and application layers. Security mechanisms, such as Android’s sandbox and permission systems, exist in framework layer, while malware scanners protects application layer. However, there are rooms for improvement in both mechanisms. For instance, Android’s permission system is known to be implemented in ad-hoc manner and not well-tested for vulnerabilities. Application layer also focuses mainly on malware application detection, while different types of harmful applications exist on application markets. This dissertation aims to close these security gaps by performing vulnerability analysis on mobile frameworks and detecting policy-violating applications. As a result of our analysis, we find various framework-level vulnerabilities and we are able to launch serious proof-of-concept attacks on both iOS and Android platforms. We also propose mechanisms for detecting policy-violating applications and camouflaged applications. Our techniques are shown to improve the security of mobile systems and have several impacts on mobile industry. 2016-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/etd_coll_all/3 https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1004&context=etd_coll_all http://creativecommons.org/licenses/by-nc-nd/4.0/ Dissertations and Theses Collection eng Institutional Knowledge at Singapore Management University mobile security framework vulnerability OS and Networks Programming Languages and Compilers Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic mobile
security
framework
vulnerability
OS and Networks
Programming Languages and Compilers
Software Engineering
spellingShingle mobile
security
framework
vulnerability
OS and Networks
Programming Languages and Compilers
Software Engineering
SU, Mon Kywe
Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
description Mobile systems are generally composed of three layers of software: application layer where third-party applications are installed, framework layer where Application Programming Interfaces (APIs) are exposed, and kernel layer where low-level system operations are executed. In this dissertation, we focus on security and vulnerability analysis of framework and application layers. Security mechanisms, such as Android’s sandbox and permission systems, exist in framework layer, while malware scanners protects application layer. However, there are rooms for improvement in both mechanisms. For instance, Android’s permission system is known to be implemented in ad-hoc manner and not well-tested for vulnerabilities. Application layer also focuses mainly on malware application detection, while different types of harmful applications exist on application markets. This dissertation aims to close these security gaps by performing vulnerability analysis on mobile frameworks and detecting policy-violating applications. As a result of our analysis, we find various framework-level vulnerabilities and we are able to launch serious proof-of-concept attacks on both iOS and Android platforms. We also propose mechanisms for detecting policy-violating applications and camouflaged applications. Our techniques are shown to improve the security of mobile systems and have several impacts on mobile industry.
format text
author SU, Mon Kywe
author_facet SU, Mon Kywe
author_sort SU, Mon Kywe
title Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
title_short Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
title_full Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
title_fullStr Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
title_full_unstemmed Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
title_sort techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications
publisher Institutional Knowledge at Singapore Management University
publishDate 2016
url https://ink.library.smu.edu.sg/etd_coll_all/3
https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1004&context=etd_coll_all
_version_ 1712300781828308992