Mobility

QUIRE: Lightweight Provenance for Smart Phone Operating Systems

Download Now Free registration required

Executive Summary

Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with different privileges can communicate with one another, allowing one app to trick another into improperly exercising its privileges (a Confused Deputy attack). In QUIRE, the authors engineered new security mechanisms into Android to address these issues.

  • Format: PDF
  • Size: 1.23 KB