Android access control modeling and security analysis method based on B method

A technology of access control and analysis method, which is applied in the direction of computer security devices, instruments, electrical digital data processing, etc., and can solve the problem of not being able to provide security analysis and verification methods, not being able to verify security, and not being able to guarantee the completeness and correctness of rules, etc. question

Active Publication Date: 2020-12-18
ZHEJIANG UNIV +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, under the current situation of serious fragmentation of the Android system, the access control scheme relying on the system version has exposed application limitations, and the implementation of the scheme lacks theoretical analysis and verification, and the c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Android access control modeling and security analysis method based on B method
  • Android access control modeling and security analysis method based on B method
  • Android access control modeling and security analysis method based on B method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be described in detail below with reference to the accompanying drawings and preferred embodiments, and the purpose and effect of the present invention will become clearer. It should be understood that the specific embodiments described here are only used to explain the present invention and are not intended to limit the present invention.

[0042] Such as figure 1 As shown, the Android access control modeling and security analysis method based on method B of the present invention first incrementally builds the basic model PermSys, then builds the extended model ChainSys, InspIPC, QuireIPC, XmanRule, and finally uses theorem proof and model detection to analyze its security , the specific steps are as follows:

[0043] Step 1: Analysis of authority mechanism

[0044] The modeling of the permission mechanism is a complete formal description of the mechanism specification. First, the modeling goals and assumptions must be put forward, and the b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Android access control modeling and security analysis method based on a method B. According to the method, a formalized language B is used for stipulating and modeling security attributes and key operations in Android access control, and the security is verified through model detection. The method provides a new method for Android access control modeling and security analysis, formalized abstraction is carried out on an authority mechanism, a component entity abstraction machine is designed, a basic model is constructed, and an extension model based on a call chain,IPC tracking and a fine-grained strategy is established on the basis of the basic model. And finally, the security of the access control is analyzed according to theorem proof and a model detection result, and a practical and effective way is provided for security mechanism modeling and system security proof of the operating system.

Description

technical field [0001] The invention relates to the field of Android access control security, in particular to a method for modeling and security analysis of Android access control based on the B method. Background technique [0002] With the large-scale application of the ARM-Android mobile platform architecture in the Internet of Things scenario, its security issues have become a research hotspot in industry and academia. Android is a permission-based access control system. Aiming at problems such as too coarse granularity of Android access control permissions, insufficient permission management, and insufficient document descriptions, many access control improvement solutions have been proposed to improve its security, such as the use of fine-grained access control granularity. Classical improvement strategies, implementation of behavior-based access control in system middleware, etc. At the same time, some defense schemes have been proposed for privilege escalation atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/604
Inventor 常瑞苗新亮任璐赵永望任奎赵俊单夏烨任新新段吉瑞
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products