Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1920261.1920295acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Porscha: policy oriented secure content handling in Android

Published: 06 December 2010 Publication History

Abstract

The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging photos, playing games, browsing websites, and viewing multimedia. Current phone platforms provide protections for user privacy, the cellular radio, and the integrity of the OS itself. However, few offer protections to protect the content once it enters the phone. For example, MP3-based MMS or photo content placed on Android smart phones can be extracted and shared with impunity. In this paper, we explore the requirements and enforcement of digital rights management (DRM) policy on smart phones. An analysis of the Android market shows that DRM services should ensure: a) protected content is accessible only by authorized phones b) content is only accessible by provider-endorsed applications, and c) access is regulated by contextual constraints, e.g., used for a limited time, a maximum number of viewings, etc. The Porscha system developed in this work places content proxies and reference monitors within the Android middleware to enforce DRM policies embedded in received content. A pilot study controlling content obtained over SMS, MMS, and email illustrates the expressibility and enforcement of Porscha policies. Our experiments demonstrate that Porscha is expressive enough to articulate needed DRM policies and that their enforcement has limited impact on performance.

References

[1]
Android Community ROM. http://www.cyanogenmod.com/, March 2010.
[2]
I hate DRM: A site dedicated to reclaiming consumer digital rights. http://ihatedrm.com, June 2010.
[3]
Mobile Watchdog. http://www.mymobilewatchdog.com/, January 2010.
[4]
SMS Trap. http://www.smstrap.com/, January 2010.
[5]
Stealth SMS. http://stealthsms.trusters.com/s_features.htm, January 2010.
[6]
A5/1 Security Project. Creating A5/1 Rainbow Tables. http://reflextor.com/trac/a51, 2009.
[7]
Apache Software Foundation. Apache James Mime4j. http://james.apache.org/mime4j/, March 2010.
[8]
G. Appenzeller, L. Martin, and M. Schertler. Identity-Based Encryption Architecture and Supporting Data Structures, Jan. 2009. IETF RFC 5408.
[9]
L. Bauer, S. Garriss, J. M. Mccune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the grey system. In Proceedings of the 8th Information Security Conference (ISC'05), pages 431--445, 2005.
[10]
E. Becker, W. Buhse, D. Günnewig, and N. Rump, editors. Digital Rights Management Technological, Economic, Legal and Political Aspects. Springer, 1 edition, 2003.
[11]
D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. In Proceedings of CRYPTO, 2001.
[12]
J. Clause, W. Li, and A. Orso. Dytan: A Generic Dynamic Taint Analysis Framework. In Proceedings of the 2007 International Symposium on Software Testing and Analysis (ISSTA), pages 196--206, 2007.
[13]
D. E. Denning. A Lattice Model of Secure Information Flow. Commun. ACM, 19(5):236--243, May 1976.
[14]
O. Dunkelman, N. Keller, and A. Shamir. A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony. In Proceedings of the 30th Annual Cryptology Conference (CRYPTO 2010), 2010.
[15]
J.-E. Ekberg and M. Kyläanpää. Mobile Trusted Module (MTM) - An Introduction. Technical Report NRC-TR-2007-015, Nokia Research Center, Helsinki, Finland, Nov. 2007.
[16]
W. Enck, M. Ongtang, and P. McDaniel. On Lightweight Mobile Phone Application Certification. In Proceedings of ACM CCS, November 2009.
[17]
Free Software Foundation, Inc. The Campaign to Eliminate DRM. http://www.defectivebydesign.org/, June 2010.
[18]
Gartner. Gartner Says Worldwide Mobile Phone Sales to End Users Grew 8 Per Cent in Fourth Quarter 2009; Market Remained Flat in 2009. http://www.gartner.com/it/page.jsp?id=1306513, Feb. 2010.
[19]
C. Gentry. Certificate-Based Encryption and the Certificate-Revocation Problem. Advances in Cryptology, 2656, January 2003.
[20]
M. Gholami, S. M. Hashemi, and M. Teshnelab. A Framework for Secure Message Transmission Using SMS-Based VPN. Research and Practical Issues of Enterprise Information Systems II, 1:503--511, 2008.
[21]
GigaOm. The Apple App Store Economy. http://gigaom.com/2010/01/12/the-apple-app-store-economy, Jan. 2010.
[22]
J. Horwitz and B. Lynn. Toward Hierarchical Identity-Based Encryption. In Proceedings of EUROCRYPT '02, pages 466--481, London, UK, 2002. Springer-Verlag.
[23]
J.-S. Hwu, R.-J. Chen, and Y.-B. Lin. An Efficient Identity-Based Cryptosystem for End-to-End Mobile Security. IEEE Trans. Wireless Comm., 5(9):2586--2593, September 2006.
[24]
R. Iannella. Digital Rights Management (DRM) Architectures. D-Lib Magazine, 7(6), 2001.
[25]
IETF Network Working Group. Post Office Protocol - Version 3. http://www.ietf.org/rfc/rfc1939.txt, May 1996.
[26]
IETF Network Working Group. Internet Message Access Protocol - Version 4, rev1. http://www.ietf.org/rfc/rfc1939.txt, March 2003.
[27]
IETF Network Working Group. DNS Security Introduction and Requirements. http://www.ietf.org/rfc/rfc4033.txt, March 2005.
[28]
ITU. Measuring the Information Society. http://www.itu.int/ITU-D/ict/publications/idi/2010/index.html, 2010.
[29]
S. Jobs. Thoughts on Music. http://www.apple.com/hotnews/thoughtsonmusic/, February 2007.
[30]
M. Kirkpatrick and E. Bertino. Enforcing Spatial Constraints for Mobile RBAC Systems. In Proceedings of the 15th ACM symposium on Access control models and technologies, 2010.
[31]
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo. Secure Key Issuing in ID-based Cryptography. In Proceedings of the ACSW Frontiers Workshop, 2004.
[32]
P. A. Loscocco, P. W. Wilson, J. A. Pendergrass, and C. D. McDonell. Linux Kernel Integrity Measurement Using Contextual Inspection. In Proceedings of ACM STC, 2007.
[33]
Microsoft Corporation. ActiveSync HTTP Protocol Specification, version 6.0. http://msdn.microsoft.com/en-us/library/dd299446(EXCHG. 80).aspx, May 2010.
[34]
Microsoft Corporation. Microsoft PlayReady. http://www.microsoft.com/playready/default.mspx, June 2010.
[35]
D. Muthukumaran, A. Sawani, J. Schiffman, B. M. Jung, and T. Jaeger. Measuring Integrity on Mobile Phone Systems. In Proceedings of ACM SACMAT, June 2008.
[36]
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically Rich Application-Centric Security in Android. In Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2009.
[37]
Open Mobile Alliance Ltd. Rights Expression Language Version 1.0. Technical Report OMA-Download-DRMREL-V1_0-20040615-A, Open Mobile Alliance, June 2004.
[38]
Open Mobile Alliance Ltd. DRM Architecture 2.0.1. Technical Report OMA-AD-DRM-V2_0_1-20080226-A, Open Mobile Alliance, February 2008.
[39]
Open Mobile Alliance Ltd. DRM Rights Expression Language Version 2.0.2. Technical Report OMA-TS-DRM_REL-V2_0_2-20080723-A, Open Mobile Alliance, July 2008.
[40]
PacketVideo Corporation. Content Policy Manager Developer's Guide OHA 1.0 r.1. November 2008.
[41]
PacketVideo Corporation. PV Android DivX Premium Package. July 2009.
[42]
PacketVideo Corporation. PV Android Windows Media Package. November 2009.
[43]
Portio Research. Mobile Messaging Futures 2010--2014: Analysis and Growth Forecsts for Mobile Messaging Markets Worldwide, 2010.
[44]
V. Rao and T. Jaeger. Dynamic Mandatory Access Control for Multiple Stakeholders. In Proceedings of ACM SACMAT, June 2009.
[45]
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and Implementation of a TCG-based Integrity Measurement Architecture. In Proceedings of the 13th USENIX Security Symposium, Aug. 2004.
[46]
A. Shabtai, Y. Fledel, and Y. Elovici. Securing Android-Powered Mobile Devices Using SELinux. IEEE Security and Privacy, 8:36--44, 2010.
[47]
S. Smalley, C. Vance, and W. Salamon. Implementing SELinux as a Linux Security Module. Technical Report 01--043, NAI Labs, 2001.
[48]
M. Smith, C. Schridde, B. Agel, and B. Freisleben. Securing Mobile Phone Calls with Identity-Based Cryptography. LNCS: Advances in Information Security and Assurance, 5576:210--222, June 2009.
[49]
TCG. TPM Main: Part 1 - Design Principles. Specification Version 1.2, Level 2 Revision 103. 2007.
[50]
P. Traynor, P. McDaniel, and T. La Porta. Security for Telecommunications Networks. Advances in Information Security. Springer, July 2008.
[51]
Z. Wan, K. Ren, and B. Preneel. A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks. In Proceedings of ACM WiSec, 2008.
[52]
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis. In Proceedings of ACM CCS, 2007.

Cited By

View all
  • (2023)Analysis of Security and Privacy Challenges Associated with Byod in the Education Sector: State-of-the-Art Strategy2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)10.1109/ICOEI56765.2023.10125767(665-675)Online publication date: 11-Apr-2023
  • (2022)Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security PerimetersIEEE Transactions on Mobile Computing10.1109/TMC.2020.300085221:1(76-92)Online publication date: 1-Jan-2022
  • (2022)TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM PlatformIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.317027417(1709-1724)Online publication date: 2022
  • Show More Cited By

Recommendations

Reviews

Eduardo B. Fernandez

There is little protection for the content downloaded to cell phones. In Android, it is up to the programmers to define what their applications can access-malicious applications can exploit this in order to access unauthorized data. The Open Mobile Alliance (OMA), a consortium of phone manufacturers, defined digital rights management (DRM) requirements to enforce control of access to content. However, its granularity is too coarse: it does not protect content that is already on a phone because the rights are assigned to the whole phone, not to specific applications. To improve this situation, this paper proposes a policy-based access control system (Porscha) that protects the content when it is delivered to the phone and once it is on the phone. This clear and well-written paper provides a concise survey of the main system and application features of Android architectures, with particular emphasis on security. It starts with a description of a phone's uses, trying to understand its threats and define security requirements for the system; a set of DRM policies is defined from this analysis. The authors then analyze how content is delivered and used by applications, as well as any threats. They define a trusted computing base (TCB) and consider the network to be untrusted because of the deficiencies of current encryption approaches. In order to protect content in transit, they define a type of public key infrastructure (PKI) that uses identity-based public keys. They also propose a mediator to enforce policies for the content on the phone. The paper evaluates the cost (overhead) of policy enforcement and finds it to be reasonable. The authors' security evaluation includes protecting the private key, dealing with recipients without Porscha, and their assumptions about the level of trust on the platform, including Android and the Linux kernel. They also discuss Porscha as an access control system for content. The paper includes a good set of references. This excellent paper will be very useful to readers who work in this field or who are concerned with the security of wireless applications. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACSAC '10: Proceedings of the 26th Annual Computer Security Applications Conference
December 2010
419 pages
ISBN:9781450301336
DOI:10.1145/1920261
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • ACSA: Applied Computing Security Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 December 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Android
  2. DRM
  3. mobile phone security
  4. security policy

Qualifiers

  • Research-article

Conference

ACSAC '10
Sponsor:
  • ACSA

Acceptance Rates

Overall Acceptance Rate 104 of 497 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Analysis of Security and Privacy Challenges Associated with Byod in the Education Sector: State-of-the-Art Strategy2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)10.1109/ICOEI56765.2023.10125767(665-675)Online publication date: 11-Apr-2023
  • (2022)Don't Just BYOD, Bring-Your-Own-App Too! Protection via Virtual Micro Security PerimetersIEEE Transactions on Mobile Computing10.1109/TMC.2020.300085221:1(76-92)Online publication date: 1-Jan-2022
  • (2022)TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM PlatformIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.317027417(1709-1724)Online publication date: 2022
  • (2019)Implications of smartphone user privacy leakage from the advertiser’s perspectivePervasive and Mobile Computing10.1016/j.pmcj.2018.12.00653(13-32)Online publication date: Feb-2019
  • (2019)The Android malware detection systems between hope and realitySN Applied Sciences10.1007/s42452-019-1124-x1:9Online publication date: 29-Aug-2019
  • (2019)A context-driven privacy enforcement system for autonomous media capture devicesMultimedia Tools and Applications10.1007/s11042-019-7376-z78:10(14091-14108)Online publication date: 1-May-2019
  • (2018)Curator --- a secure shared object storeProceedings of the 33rd Annual ACM Symposium on Applied Computing10.1145/3167132.3167190(533-540)Online publication date: 9-Apr-2018
  • (2018)Conceptual framework for the security of mobile health applications on Android platformTelematics and Informatics10.1016/j.tele.2018.03.00535:5(1335-1354)Online publication date: Aug-2018
  • (2017)Developing an Intelligent Filtering Technique for Bring Your Own Device Network Access ControlProceedings of the International Conference on Future Networks and Distributed Systems10.1145/3102304.3105573(1-8)Online publication date: 19-Jul-2017
  • (2017)TrUbiProceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing10.1145/3084041.3084066(1-10)Online publication date: 10-Jul-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media