Characterizing SEAndroid policies in the wild

Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

3 Citations (Scopus)

Abstract

Starting from the 5.0 Lollipop release all Android processes must be run inside confined SEAndroid access control domains. As a result, Android device manufacturers were compelled to develop SEAndroid expertise in order to create policies for their device-specific components. In this paper we analyse SEAndroid policies from a number of 5.0 Lollipop devices on the market, and identify patterns of common problems we found. We also suggest some practical tools that can improve policy design and analysis. We implemented the first of such tools, SEAL.

Original languageEnglish
Title of host publicationICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy
PublisherSciTePress
Pages482-489
Number of pages8
ISBN (Print)9789897581670
DOIs
Publication statusPublished - 2016
MoE publication typeA4 Conference publication
EventInternational Conference on Information Systems Security and Privacy - Rome, Italy
Duration: 19 Feb 201621 Feb 2016
Conference number: 2

Conference

ConferenceInternational Conference on Information Systems Security and Privacy
Abbreviated titleICISSP
Country/TerritoryItaly
CityRome
Period19/02/201621/02/2016

Keywords

  • Access Control
  • SEAndroid
  • Security
  • SELinux

Fingerprint

Dive into the research topics of 'Characterizing SEAndroid policies in the wild'. Together they form a unique fingerprint.
  • SELint: an SEAndroid policy analysis tool

    Reshetova, E., Bonazzi, F. & Asokan, N., 8 Aug 2016, arXiv, 13 p. (arXiv preprints).

    Research output: Working paperProfessional

Cite this