|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Aurasium: Practical Policy Enforcement for Android Applications
If you have a question about this talk, please contact Wei Ming Khoo.
With the increasing popularity and growing market share of Google’s mobile platform Android, it has become the top target of latest mobile malware. Previous work on Android security and privacy control produced solutions that require modification to the operating system itself. This requires the user to root his phone to install custom firmware due to software, hardware, and policy choices by Google, the phone manufacturers, and cellular providers. There is no guarantee that these solutions will ever make their way to consumers unless Google implements them in the main Android OS source code repository.
We developed a novel approach named Aurasium that bypasses the need to change the firmware. We automatically rewrite arbitrary apps by attaching interposition code to closely watch the application’s behaviour for security and privacy violations, such as attempts to retrieve a user’s sensitive information, send SMS covertly to premium numbers, or access malicious IP addresses. Aurasium can also detect and prevent cases of privilege escalation attacks. Experiments show that we can apply Aurasium to a large corpus of benign and malicious applications with over 99% success rate.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsRussian Society Biology women@CL Coffee and Cake
Other talksStem cells: from basic research to bioprocessing INTERROGATING THE ARCHITECTURE OF CANCER GENOMES How to combine quantum Boltzmann statistics with classical dynamics Imaging phatocytosis: receptors, phospholipids and the cytoskeleton Host: Rob Kay (MRC-LMB) Bluestockings Annual General Meeting