Android occupies the absolute dominant position in mobile operating system and has the largest market share. Meanwhile, Android faces the risk of malicious insiders leaking sensitive information. In this paper, we present DefDroid, a repackaging tool for enforcing security policies by modifying Android applications without root privilege. The main advantages of DefDroid are that it provides a user-friendly interface to configure fine-grained policies and it supplies multiple deploy- ment methods. We have implemented policies aimed at three types of services of Android system, i.e., content provider, file system, and network. We choose 74 arbitrary applications from Android market and the experimental results show that the successful rate of repackaging applications is about 94.6% which effectively improve the privacy security of Android system while the increased overhead can be tolerated. Keywords—Android; permission restriction; repackage; bytecode instrumentation
[1]
Walter Binder,et al.
DiSL: a domain-specific language for bytecode instrumentation
,
2012,
AOSD.
[2]
Jacques Klein,et al.
Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation
,
2012,
ArXiv.
[3]
Seungyeop Han,et al.
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications
,
2011,
CCS '11.
[4]
Ross J. Anderson,et al.
Aurasium: Practical Policy Enforcement for Android Applications
,
2012,
USENIX Security Symposium.
[5]
Giovanni Russello,et al.
FireDroid: hardening security in almost-stock Android
,
2013,
ACSAC.
[6]
Byung-Gon Chun,et al.
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
,
2010,
OSDI.