The Android Platform Security Model (2023)
ACM Transactions on Privacy and Security, Volume 24, Issue 3, Article No. 19, 2021, pp 1-35 Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access t...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Mayrhofer, René Stoep, Jeffrey Vander Brubaker, Chad Hackborn, Dianne Bonné, Bram Tuncay, Güliz Seray Jover, Roger Piqueras Specter, Michael A |
description | ACM Transactions on Privacy and Security, Volume 24, Issue 3,
Article No. 19, 2021, pp 1-35 Android is the most widely deployed end-user focused operating system. With
its growing set of use cases encompassing communication, navigation, media
consumption, entertainment, finance, health, and access to sensors, actuators,
cameras, or microphones, its underlying security model needs to address a host
of practical threats in a wide variety of scenarios while being useful to
non-security experts. To support this flexibility, Android's security model
must strike a difficult balance between security, privacy, and usability for
end users; provide assurances for app developers; and maintain system
performance under tight hardware constraints. This paper aims to both document
the assumed threat model and discuss its implications, with a focus on the
ecosystem context in which Android exists. We analyze how different security
measures in past and current Android implementations work together to mitigate
these threats, and, where there are special cases in applying the security
model in practice; we discuss these deliberate deviations and examine their
impact. |
doi_str_mv | 10.48550/arxiv.1904.05572 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1904_05572</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1904_05572</sourcerecordid><originalsourceid>FETCH-LOGICAL-a672-2ed723e098f632a37f6cbada3f11d9358390d49dc71987f7db8ef89bcf5c19bb3</originalsourceid><addsrcrecordid>eNotzs2KwjAUQOFsXIj6AK7MUoV2ktymSZYiOjOgKNh9SXITLFQr8Qd9-2GcWZ3d4SNkzFleaCnZh03P5pFzw4qcSalEn8yrY6CLM6auQbpv7S126UQPwd9Tc3vRbYehpVPBBMyGpBdtew2j_w5ItV5Vy69ss_v8Xi42mS2VyERAJSAwo2MJwoKKpXcWLUTO0YDUYBgWBr3iRquo0OkQtXE-Ss-NczAgk7_tG1tfUnOy6VX_ous3Gn4AkDA6iw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>The Android Platform Security Model (2023)</title><source>arXiv.org</source><creator>Mayrhofer, René ; Stoep, Jeffrey Vander ; Brubaker, Chad ; Hackborn, Dianne ; Bonné, Bram ; Tuncay, Güliz Seray ; Jover, Roger Piqueras ; Specter, Michael A</creator><creatorcontrib>Mayrhofer, René ; Stoep, Jeffrey Vander ; Brubaker, Chad ; Hackborn, Dianne ; Bonné, Bram ; Tuncay, Güliz Seray ; Jover, Roger Piqueras ; Specter, Michael A</creatorcontrib><description>ACM Transactions on Privacy and Security, Volume 24, Issue 3,
Article No. 19, 2021, pp 1-35 Android is the most widely deployed end-user focused operating system. With
its growing set of use cases encompassing communication, navigation, media
consumption, entertainment, finance, health, and access to sensors, actuators,
cameras, or microphones, its underlying security model needs to address a host
of practical threats in a wide variety of scenarios while being useful to
non-security experts. To support this flexibility, Android's security model
must strike a difficult balance between security, privacy, and usability for
end users; provide assurances for app developers; and maintain system
performance under tight hardware constraints. This paper aims to both document
the assumed threat model and discuss its implications, with a focus on the
ecosystem context in which Android exists. We analyze how different security
measures in past and current Android implementations work together to mitigate
these threats, and, where there are special cases in applying the security
model in practice; we discuss these deliberate deviations and examine their
impact.</description><identifier>DOI: 10.48550/arxiv.1904.05572</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Operating Systems</subject><creationdate>2019-04</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1904.05572$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.1145/3448609$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.48550/arXiv.1904.05572$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Mayrhofer, René</creatorcontrib><creatorcontrib>Stoep, Jeffrey Vander</creatorcontrib><creatorcontrib>Brubaker, Chad</creatorcontrib><creatorcontrib>Hackborn, Dianne</creatorcontrib><creatorcontrib>Bonné, Bram</creatorcontrib><creatorcontrib>Tuncay, Güliz Seray</creatorcontrib><creatorcontrib>Jover, Roger Piqueras</creatorcontrib><creatorcontrib>Specter, Michael A</creatorcontrib><title>The Android Platform Security Model (2023)</title><description>ACM Transactions on Privacy and Security, Volume 24, Issue 3,
Article No. 19, 2021, pp 1-35 Android is the most widely deployed end-user focused operating system. With
its growing set of use cases encompassing communication, navigation, media
consumption, entertainment, finance, health, and access to sensors, actuators,
cameras, or microphones, its underlying security model needs to address a host
of practical threats in a wide variety of scenarios while being useful to
non-security experts. To support this flexibility, Android's security model
must strike a difficult balance between security, privacy, and usability for
end users; provide assurances for app developers; and maintain system
performance under tight hardware constraints. This paper aims to both document
the assumed threat model and discuss its implications, with a focus on the
ecosystem context in which Android exists. We analyze how different security
measures in past and current Android implementations work together to mitigate
these threats, and, where there are special cases in applying the security
model in practice; we discuss these deliberate deviations and examine their
impact.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Operating Systems</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzs2KwjAUQOFsXIj6AK7MUoV2ktymSZYiOjOgKNh9SXITLFQr8Qd9-2GcWZ3d4SNkzFleaCnZh03P5pFzw4qcSalEn8yrY6CLM6auQbpv7S126UQPwd9Tc3vRbYehpVPBBMyGpBdtew2j_w5ItV5Vy69ss_v8Xi42mS2VyERAJSAwo2MJwoKKpXcWLUTO0YDUYBgWBr3iRquo0OkQtXE-Ss-NczAgk7_tG1tfUnOy6VX_ous3Gn4AkDA6iw</recordid><startdate>20190411</startdate><enddate>20190411</enddate><creator>Mayrhofer, René</creator><creator>Stoep, Jeffrey Vander</creator><creator>Brubaker, Chad</creator><creator>Hackborn, Dianne</creator><creator>Bonné, Bram</creator><creator>Tuncay, Güliz Seray</creator><creator>Jover, Roger Piqueras</creator><creator>Specter, Michael A</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20190411</creationdate><title>The Android Platform Security Model (2023)</title><author>Mayrhofer, René ; Stoep, Jeffrey Vander ; Brubaker, Chad ; Hackborn, Dianne ; Bonné, Bram ; Tuncay, Güliz Seray ; Jover, Roger Piqueras ; Specter, Michael A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a672-2ed723e098f632a37f6cbada3f11d9358390d49dc71987f7db8ef89bcf5c19bb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Operating Systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Mayrhofer, René</creatorcontrib><creatorcontrib>Stoep, Jeffrey Vander</creatorcontrib><creatorcontrib>Brubaker, Chad</creatorcontrib><creatorcontrib>Hackborn, Dianne</creatorcontrib><creatorcontrib>Bonné, Bram</creatorcontrib><creatorcontrib>Tuncay, Güliz Seray</creatorcontrib><creatorcontrib>Jover, Roger Piqueras</creatorcontrib><creatorcontrib>Specter, Michael A</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mayrhofer, René</au><au>Stoep, Jeffrey Vander</au><au>Brubaker, Chad</au><au>Hackborn, Dianne</au><au>Bonné, Bram</au><au>Tuncay, Güliz Seray</au><au>Jover, Roger Piqueras</au><au>Specter, Michael A</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Android Platform Security Model (2023)</atitle><date>2019-04-11</date><risdate>2019</risdate><abstract>ACM Transactions on Privacy and Security, Volume 24, Issue 3,
Article No. 19, 2021, pp 1-35 Android is the most widely deployed end-user focused operating system. With
its growing set of use cases encompassing communication, navigation, media
consumption, entertainment, finance, health, and access to sensors, actuators,
cameras, or microphones, its underlying security model needs to address a host
of practical threats in a wide variety of scenarios while being useful to
non-security experts. To support this flexibility, Android's security model
must strike a difficult balance between security, privacy, and usability for
end users; provide assurances for app developers; and maintain system
performance under tight hardware constraints. This paper aims to both document
the assumed threat model and discuss its implications, with a focus on the
ecosystem context in which Android exists. We analyze how different security
measures in past and current Android implementations work together to mitigate
these threats, and, where there are special cases in applying the security
model in practice; we discuss these deliberate deviations and examine their
impact.</abstract><doi>10.48550/arxiv.1904.05572</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.1904.05572 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_1904_05572 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security Computer Science - Operating Systems |
title | The Android Platform Security Model (2023) |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T04%3A13%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Android%20Platform%20Security%20Model%20(2023)&rft.au=Mayrhofer,%20Ren%C3%A9&rft.date=2019-04-11&rft_id=info:doi/10.48550/arxiv.1904.05572&rft_dat=%3Carxiv_GOX%3E1904_05572%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |