TY - GEN
T1 - Paranoid android
T2 - Versatile protection for smartphones
AU - Portokalidis, Georgios
AU - Homburg, Philip
AU - Anagnostakis, Kostas
AU - Bos, Herbert
PY - 2010
Y1 - 2010
N2 - Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacy-sensitive tasks, becoming highly valuable targets for attackers. They are also quite different from PCs, so that PC-oriented solutions are not always applicable, or do not offer comprehensive security. We propose an alternative solution, where security checks are applied on remote security servers that host exact replicas of the phones in virtual environments. The servers are not subject to the same constraints, allowing us to apply multiple detection techniques simultaneously. We implemented a prototype of this security model for Android phones, and show that it is both practical and scalable: we generate no more than 2KiB/s and 64B/s of trace data for high-loads and idle operation respectively, and are able to support more than a hundred replicas running on a single server.
AB - Smartphone usage has been continuously increasing in recent years. Moreover, smartphones are often used for privacy-sensitive tasks, becoming highly valuable targets for attackers. They are also quite different from PCs, so that PC-oriented solutions are not always applicable, or do not offer comprehensive security. We propose an alternative solution, where security checks are applied on remote security servers that host exact replicas of the phones in virtual environments. The servers are not subject to the same constraints, allowing us to apply multiple detection techniques simultaneously. We implemented a prototype of this security model for Android phones, and show that it is both practical and scalable: we generate no more than 2KiB/s and 64B/s of trace data for high-loads and idle operation respectively, and are able to support more than a hundred replicas running on a single server.
KW - Android
KW - decoupled security
KW - smartphones
UR - http://www.scopus.com/inward/record.url?scp=78751498804&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78751498804&partnerID=8YFLogxK
U2 - 10.1145/1920261.1920313
DO - 10.1145/1920261.1920313
M3 - Conference contribution
AN - SCOPUS:78751498804
SN - 9781450301336
T3 - Proceedings - Annual Computer Security Applications Conference, ACSAC
SP - 347
EP - 356
BT - Proceedings - 26th Annual Computer Security Applications Conference, ACSAC 2010
ER -