Skip to main content

SAMoC: Self-aware Access Monitoring and Controlling Framework for Android

  • Conference paper
  • First Online:
Information and Communication Technology for Development for Africa (ICT4DA 2019)

Abstract

We present the concept and specification of a self-aware access monitoring and controlling framework for Android. The lack of users’ security awareness, Android operating system’s security limitations and the widespread use of Android for personal and organizational activities emphasizes the importance of improving its security. The proposed SAMoC framework strengthens the security of Android through learning based operation refinements. The introduction of a monitoring agent on each resource and a self-aware layer in the Android software stack allows to detect unexpected events and perform fine-grained access control over the resources. The self-aware layer can automatically refine the policies or provide suggestions depending on its configuration. The SAMoC framework enforces specific restrictions on an individual user basis and allows the users to play a role in the system operation optimization due to its transparent nature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The Android source code. https://source.android.com/source/index.html

  2. Arzt, S., et al.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. ACM SIGPLAN Not. 49(6), 259–269 (2014)

    Article  Google Scholar 

  3. Heuser, S., Nadkarni, A., Enck, W., Sadeghi, A.-R.: ASM: a programmable interface for extending Android security. In: Proceedings of 23rd USENIX Security Symposium (SEC 2014). USENIX (2014)

    Google Scholar 

  4. Wang, X., Sun, K., Wang, Y., Jing, J.: DeepDroid: dynamically enforcing enterprise policy on Android devices. In: Proceedings of 22nd Annual Network and Distributed System Security Symposium (NDSS 2015). The Internet Society (2015)

    Google Scholar 

  5. Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R.: Xmandroid: a new Android evolution to mitigate privilege escalation attacks. Technical report TR-2011-04. Technische Universität Darmstadt (2011)

    Google Scholar 

  6. Smalley, S., Craig, R.: Security enhanced (SE) Android: bringing flexible MAC to Android. In: Proceedings of 20nd Annual Network and Distributed System Security Symposium (NDSS 2013), vol. 310, pp. 20–38. NDSS (2013)

    Google Scholar 

  7. Android Developers-Mainfest.permission. http://developer.android.com/reference/android/Manifest.permission.html

  8. Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2) (2014)

    Article  Google Scholar 

  9. Fawaz, K., Shin, K.G.: Location privacy protection for smartphone users. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 239–250. ACM (2014)

    Google Scholar 

  10. Wei, F., Roy, S., Ou, X.: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of Android apps. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1329–1341. ACM (2014)

    Google Scholar 

  11. Isomaki, M., Nieminen, J., Gomez, C., Shelby, Z., Savolainen, T., Patil, B.: IPv6 over BLUETOOTH (R) Low Energy (2015)

    Google Scholar 

  12. Wang, H., Xi, M., Liu, J., Chen, C.: Transmitting IPv6 packets over Bluetooth low energy based on BlueZ. In: Proceedings of 15th International Conference on Advanced Communication Technology (ICACT), pp. 72–77. IEEE (2013)

    Google Scholar 

  13. Skorin-Kapov, L., Pripuzic, K., Marjanovic, M., Antonic, A., Zarko, I.P.: Energy efficient and quality-driven continuous sensor management for mobile IoT applications. In: Proceedings of 2014 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 397–406. IEEE (2014)

    Google Scholar 

  14. Angelopoulos, C.M., Evangelatos, O., Nikoletseas, S., Raptis, T.P., Rolim, J.D.P., Veroutis, K.: A user-enabled testbed architecture with mobile crowdsensing support for smart, green buildings. In: The Proceedings of 2015 IEEE International Conference on Communications (ICC), pp. 573–578. IEEE (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ethiopia Nigussie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Thanigaivelan, N.K., Nigussie, E., Virtanen, S., Isoaho, J. (2019). SAMoC: Self-aware Access Monitoring and Controlling Framework for Android. In: Mekuria, F., Nigussie, E., Tegegne, T. (eds) Information and Communication Technology for Development for Africa. ICT4DA 2019. Communications in Computer and Information Science, vol 1026. Springer, Cham. https://doi.org/10.1007/978-3-030-26630-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26630-1_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-26629-5

  • Online ISBN: 978-3-030-26630-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics