A B-based access control modeling and security analysis method for android

An access control and analysis method technology, applied in computer security devices, instruments, computing, etc., can solve problems such as security cannot be verified, Android platform access control lacks access control formal models, and solution implementation lacks theoretical analysis and verification.

Active Publication Date: 2022-04-05
ZHEJIANG UNIV +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, under the current situation of serious fragmentation of the Android system, the access control scheme relying on the system version has exposed application limitations, and the implementation of the scheme lacks theoretical analysis and verification, and the completeness and correctness of the rules cannot be guaranteed, and its security cannot be obtained. verify
To sum up, the Android platform access control lacks a general access control formal model, and cannot provide a unified security analysis and verification method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A B-based access control modeling and security analysis method for android
  • A B-based access control modeling and security analysis method for android
  • A B-based access control modeling and security analysis method for android

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be described in detail below with reference to the accompanying drawings and preferred embodiments, and the purpose and effect of the present invention will become clearer. It should be understood that the specific embodiments described here are only used to explain the present invention and are not intended to limit the present invention.

[0042] Such as figure 1 As shown, the Android access control modeling and security analysis method based on method B of the present invention first incrementally builds the basic model PermSys, then builds the extended model ChainSys, InspIPC, QuireIPC, XmanRule, and finally uses theorem proof and model detection to analyze its security , the specific steps are as follows:

[0043] Step 1: Analysis of authority mechanism

[0044] The modeling of the permission mechanism is a complete formal description of the mechanism specification. First, the modeling goals and assumptions must be put forward, and the b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Android access control modeling and security analysis method based on the B method. The method uses formal language B to regulate and model the security attributes and key operations in Android access control, and verify the security through model detection. . This method provides a new method for Android access control modeling and security analysis. It formalizes the abstraction of the permission mechanism, designs the component entity abstraction machine and builds the basic model. And the extended model based on fine-grained policy, and finally analyze the security of the access control according to the theorem proof and model detection results, which provides a practical and effective way for operating system security mechanism modeling and system security proof.

Description

technical field [0001] The invention relates to the field of Android access control security, in particular to a method for modeling and security analysis of Android access control based on the B method. Background technique [0002] With the large-scale application of the ARM-Android mobile platform architecture in the Internet of Things scenario, its security issues have become a research hotspot in industry and academia. Android is a permission-based access control system. Aiming at problems such as too coarse granularity of Android access control permissions, insufficient permission management, and insufficient document descriptions, many access control improvement solutions have been proposed to improve its security, such as the use of fine-grained access control granularity. Classical improvement strategies, implementation of behavior-based access control in system middleware, etc. At the same time, some defense schemes have been proposed for privilege escalation atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/604
Inventor 常瑞苗新亮任璐赵永望任奎赵俊单夏烨任新新段吉瑞
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products