Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones

Thomas Zefferer, Peter Teufl

2013

Abstract

For security-critical applications, the integrity and security of end-user devices is of particular importance. This especially applies to mobile applications that use smartphones to process security-critical data. Unfortunately, users often compromise the security of smartphones by disabling security features for convenience reasons or by unintentionally installing malware from untrusted application sources. Mobile device management (MDM) solutions overcome this problem by providing means to centrally manage and configure smartphones. However, MDM is mainly suitable for corporate environments but often cannot be applied in non-corporate fields of application such as m-banking or m-government. To address this problem, we propose an alternative approach to assure the security and integrity of smartphones. Our approach relies on a device assessor that evaluates the current state of a smartphone according to a security policy. Integration of this device assessor allows smartphone applications to condition the processing of security-critical data on the smartphone’s compliance with a defined security policy. We have shown the practicability of the proposed approach by means of a concrete implementation for the Android platform. We have evaluated this implementation on different Android devices. Obtained results show that our approach constitutes an appropriate alternative for scenarios, in which MDM cannot be applied.

References

  1. Bing, H. (2012). Analysis and Research of System Security Based on Android. In 2012 Fifth International Conference on Intelligent Computation Technology and Automation, pages 581-584. IEEE.
  2. Chen, Y. and Ku, W.-S. (2009). Self-Encryption Scheme for Data Security in Mobile Devices. In 2009 6th IEEE Consumer Communications and Networking Conference, number 607, pages 1-5. IEEE.
  3. Chin, E., Felt, A. P., Greenwood, K., and Wagner, D. (2011). Analyzing Inter-Application Communication in Android. In Components, MobiSys 7811, pages 239- 252. ACM Press.
  4. Enck, W., Octeau, D., Mcdaniel, P., and Chaudhuri, S. (2011). A Study of Android Application Security. In USENIX Security, number August in SEC'11, pages 935-936. USENIX Association.
  5. Enck, W., Ongtang, M., and McDaniel, P. (2009). Understanding Android Security. In IEEE Security Privacy Magazine, volume 7, pages 50-57. IEEE.
  6. Felt, A. P. (2012). Android Permissions : User Attention, Comprehension, and Behavior. In Science And Technology, pages 1-16.
  7. Gasti, P. and Chen, Y. C. Y. (2010). Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices. In Parallel Distributed and NetworkBased Processing PDP 2010 18th Euromicro International Conference on, pages 624-630. IEEE.
  8. Hackmageddon (2011). One Year Of Android Malware (Full List). http://hackmageddon.com/2011/08/11/ one-year-of-android-malware-full-list/.
  9. Hashimoto, M., Kim, M., Tsuji, H., and Tanaka, H. (2009). Policy Description Language for Dynamic Access Control Models. In 2009 Eighth IEEE International Conference on Dependable Autonomic and Secure Computing.
  10. Lookout Mobile Security (2011). 2011 Mobile Threat Report. https://www.lookout.com/resources/reports/ mobile-threat-report.
  11. Lv, T. and Yan, P. (2006). A Web Security Solution based on XML Technology. In 2006 International Conference on Communication Technology, pages 1-4. Ieee.
  12. Pacatilu, P. (2011). Android Applications Security. In Informatica Economica, volume 15, pages 163-171. Informatica Economica.
  13. Schwartz, M. J. (2012). Zeus Botnet Eurograbber Steals $47 Million. http://www.informationweek.com/ security/attacks/zeus-botnet-eurograbber-steals-47- millio/240143837.
  14. Shabtai, A., Fledel, Y., and Elovici, Y. (2010). Securing Android-Powered Mobile Devices Using SELinux. In IEEE Security Privacy Magazine, volume 8, pages 36-44. IEEE Computer Society.
  15. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., and Dolev, S. (2009). Google Android: A State-of-the-Art Review of Security Mechanisms. In Neural Networks, volume 126, page 42.
  16. Shurui, L., Jie, L., Ru, Z., and Cong, W. (2010). A Modified AES Algorithm for the Platform of Smartphone. In Computational Aspects of Social Networks CASoN 2010 International Conference on, pages 749-752. IEEE.
  17. Tang, W., Jin, G., He, J., and Jiang, X. (2011). Extending Android Security Enforcement with a Security Distance Model. In 2011 International Conference on Internet Technology and Applications, pages 1-4. IEEE.
  18. Woods, S. (2013). Bring Your Own Device (BYOD) Increasingly Important to Small Business Budgets. http://technorati.com/business/small-business/article/ bring-your-own-device-byod-increasingly/.
Download


Paper Citation


in Harvard Style

Zefferer T. and Teufl P. (2013). Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 347-354. DOI: 10.5220/0004509903470354


in Bibtex Style

@conference{secrypt13,
author={Thomas Zefferer and Peter Teufl},
title={Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={347-354},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004509903470354},
isbn={978-989-8565-73-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones
SN - 978-989-8565-73-0
AU - Zefferer T.
AU - Teufl P.
PY - 2013
SP - 347
EP - 354
DO - 10.5220/0004509903470354