proposed device assessor allows third-party applica-
tions to refrain from executing security-critical oper-
ations on potentially insecure smartphones. We have
shown the practicability of this approach by means of
a concrete implementation for the Android platform.
Furthermore, we have evaluated the reliability and ap-
plicability of our implementation on a set of virtual
and real Android smartphones. Obtained results of
this evaluation show that the proposed device asses-
sor is able to reliably assess a wide range of security
properties on smartphones.
Although the developed device assessor has al-
ready been made publicly available and is ready for
productive operation, several further developments
are considered as future work. This includes a further
improvement of the implmented assessment methods
and the evaluation of alternative policy-description
languages that could potentially replace the currently
used policy format. We are also evaluating potential-
ities to port the existing Android based solution also
to other smartphone platforms.
Even though there is still room for improvement,
the current implementation presented in this paper al-
ready demonstrates the general practicability of the
proposed approach and its capability to assure the se-
curity of mobile end-user devices in scenarios such as
m-banking or m-government, in which MDM is not
an option.
REFERENCES
Bing, H. (2012). Analysis and Research of System Security
Based on Android. In 2012 Fifth International Con-
ference on Intelligent Computation Technology and
Automation, pages 581–584. IEEE.
Chen, Y. and Ku, W.-S. (2009). Self-Encryption Scheme for
Data Security in Mobile Devices. In 2009 6th IEEE
Consumer Communications and Networking Confer-
ence, number 607, pages 1–5. IEEE.
Chin, E., Felt, A. P., Greenwood, K., and Wagner, D.
(2011). Analyzing Inter-Application Communication
in Android. In Components, MobiSys ’11, pages 239–
252. ACM Press.
Enck, W., Octeau, D., Mcdaniel, P., and Chaudhuri, S.
(2011). A Study of Android Application Security. In
USENIX Security, number August in SEC’11, pages
935–936. USENIX Association.
Enck, W., Ongtang, M., and McDaniel, P. (2009). Under-
standing Android Security. In IEEE Security Privacy
Magazine, volume 7, pages 50–57. IEEE.
Felt, A. P. (2012). Android Permissions : User Attention,
Comprehension, and Behavior. In Science And Tech-
nology, pages 1–16.
Gasti, P. and Chen, Y. C. Y. (2010). Breaking and Fixing the
Self Encryption Scheme for Data Security in Mobile
Devices. In Parallel Distributed and NetworkBased
Processing PDP 2010 18th Euromicro International
Conference on, pages 624–630. IEEE.
Hackmageddon (2011). One Year Of Android Malware
(Full List). http://hackmageddon.com/2011/08/11/
one-year-of-android-malware-full-list/.
Hashimoto, M., Kim, M., Tsuji, H., and Tanaka, H. (2009).
Policy Description Language for Dynamic Access
Control Models. In 2009 Eighth IEEE International
Conference on Dependable Autonomic and Secure
Computing.
Lookout Mobile Security (2011). 2011 Mobile Threat
Report. https://www.lookout.com/resources/reports/
mobile-threat-report.
Lv, T. and Yan, P. (2006). A Web Security Solution based on
XML Technology. In 2006 International Conference
on Communication Technology, pages 1–4. Ieee.
Pacatilu, P. (2011). Android Applications Security. In In-
formatica Economica, volume 15, pages 163–171. In-
formatica Economica.
Schwartz, M. J. (2012). Zeus Botnet Eurograbber Steals
$47 Million. http://www.informationweek.com/
security/attacks/zeus-botnet-eurograbber-steals-47-
millio/240143837.
Shabtai, A., Fledel, Y., and Elovici, Y. (2010). Securing
Android-Powered Mobile Devices Using SELinux. In
IEEE Security Privacy Magazine, volume 8, pages
36–44. IEEE Computer Society.
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., and Dolev,
S. (2009). Google Android: A State-of-the-Art Re-
view of Security Mechanisms. In Neural Networks,
volume 126, page 42.
Shurui, L., Jie, L., Ru, Z., and Cong, W. (2010). A Modi-
fied AES Algorithm for the Platform of Smartphone.
In Computational Aspects of Social Networks CASoN
2010 International Conference on, pages 749–752.
IEEE.
Tang, W., Jin, G., He, J., and Jiang, X. (2011). Extending
Android Security Enforcement with a Security Dis-
tance Model. In 2011 International Conference on In-
ternet Technology and Applications, pages 1–4. IEEE.
Woods, S. (2013). Bring Your Own Device (BYOD)
Increasingly Important to Small Business Budgets.
http://technorati.com/business/small-business/article/
bring-your-own-device-byod-increasingly/.
SECRYPT2013-InternationalConferenceonSecurityandCryptography
354