Characterizing SEAndroid Policies in the Wild

Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan

2016

Abstract

Starting from the 5.0 Lollipop release all Android processes must be run inside confined SEAndroid access control domains. As a result, Android device manufacturers were compelled to develop SEAndroid expertise in order to create policies for their device-specific components. In this paper we analyse SEAndroid policies from a number of 5.0 Lollipop devices on the market, and identify patterns of common problems we found. We also suggest some practical tools that can improve policy design and analysis. We implemented the first of such tools, SEAL.

Download


Paper Citation


in Harvard Style

Reshetova E., Bonazzi F., Nyman T., Borgaonkar R. and Asokan N. (2016). Characterizing SEAndroid Policies in the Wild . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 482-489. DOI: 10.5220/0005759204820489

in Bibtex Style

@conference{icissp16,
author={Elena Reshetova and Filippo Bonazzi and Thomas Nyman and Ravishankar Borgaonkar and N. Asokan},
title={Characterizing SEAndroid Policies in the Wild},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={482-489},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005759204820489},
isbn={978-989-758-167-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Characterizing SEAndroid Policies in the Wild
SN - 978-989-758-167-0
AU - Reshetova E.
AU - Bonazzi F.
AU - Nyman T.
AU - Borgaonkar R.
AU - Asokan N.
PY - 2016
SP - 482
EP - 489
DO - 10.5220/0005759204820489