The Android Platform Security Model (2023)

ACM Transactions on Privacy and Security, Volume 24, Issue 3, Article No. 19, 2021, pp 1-35 Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Mayrhofer, René, Stoep, Jeffrey Vander, Brubaker, Chad, Hackborn, Dianne, Bonné, Bram, Tuncay, Güliz Seray, Jover, Roger Piqueras, Specter, Michael A
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Mayrhofer, René
Stoep, Jeffrey Vander
Brubaker, Chad
Hackborn, Dianne
Bonné, Bram
Tuncay, Güliz Seray
Jover, Roger Piqueras
Specter, Michael A
description ACM Transactions on Privacy and Security, Volume 24, Issue 3, Article No. 19, 2021, pp 1-35 Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. To support this flexibility, Android's security model must strike a difficult balance between security, privacy, and usability for end users; provide assurances for app developers; and maintain system performance under tight hardware constraints. This paper aims to both document the assumed threat model and discuss its implications, with a focus on the ecosystem context in which Android exists. We analyze how different security measures in past and current Android implementations work together to mitigate these threats, and, where there are special cases in applying the security model in practice; we discuss these deliberate deviations and examine their impact.
doi_str_mv 10.48550/arxiv.1904.05572
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1904_05572</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1904_05572</sourcerecordid><originalsourceid>FETCH-LOGICAL-a672-2ed723e098f632a37f6cbada3f11d9358390d49dc71987f7db8ef89bcf5c19bb3</originalsourceid><addsrcrecordid>eNotzs2KwjAUQOFsXIj6AK7MUoV2ktymSZYiOjOgKNh9SXITLFQr8Qd9-2GcWZ3d4SNkzFleaCnZh03P5pFzw4qcSalEn8yrY6CLM6auQbpv7S126UQPwd9Tc3vRbYehpVPBBMyGpBdtew2j_w5ItV5Vy69ss_v8Xi42mS2VyERAJSAwo2MJwoKKpXcWLUTO0YDUYBgWBr3iRquo0OkQtXE-Ss-NczAgk7_tG1tfUnOy6VX_ous3Gn4AkDA6iw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>The Android Platform Security Model (2023)</title><source>arXiv.org</source><creator>Mayrhofer, René ; Stoep, Jeffrey Vander ; Brubaker, Chad ; Hackborn, Dianne ; Bonné, Bram ; Tuncay, Güliz Seray ; Jover, Roger Piqueras ; Specter, Michael A</creator><creatorcontrib>Mayrhofer, René ; Stoep, Jeffrey Vander ; Brubaker, Chad ; Hackborn, Dianne ; Bonné, Bram ; Tuncay, Güliz Seray ; Jover, Roger Piqueras ; Specter, Michael A</creatorcontrib><description>ACM Transactions on Privacy and Security, Volume 24, Issue 3, Article No. 19, 2021, pp 1-35 Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. To support this flexibility, Android's security model must strike a difficult balance between security, privacy, and usability for end users; provide assurances for app developers; and maintain system performance under tight hardware constraints. This paper aims to both document the assumed threat model and discuss its implications, with a focus on the ecosystem context in which Android exists. We analyze how different security measures in past and current Android implementations work together to mitigate these threats, and, where there are special cases in applying the security model in practice; we discuss these deliberate deviations and examine their impact.</description><identifier>DOI: 10.48550/arxiv.1904.05572</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Operating Systems</subject><creationdate>2019-04</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1904.05572$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.1145/3448609$$DView published paper (Access to full text may be restricted)$$Hfree_for_read</backlink><backlink>$$Uhttps://doi.org/10.48550/arXiv.1904.05572$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Mayrhofer, René</creatorcontrib><creatorcontrib>Stoep, Jeffrey Vander</creatorcontrib><creatorcontrib>Brubaker, Chad</creatorcontrib><creatorcontrib>Hackborn, Dianne</creatorcontrib><creatorcontrib>Bonné, Bram</creatorcontrib><creatorcontrib>Tuncay, Güliz Seray</creatorcontrib><creatorcontrib>Jover, Roger Piqueras</creatorcontrib><creatorcontrib>Specter, Michael A</creatorcontrib><title>The Android Platform Security Model (2023)</title><description>ACM Transactions on Privacy and Security, Volume 24, Issue 3, Article No. 19, 2021, pp 1-35 Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. To support this flexibility, Android's security model must strike a difficult balance between security, privacy, and usability for end users; provide assurances for app developers; and maintain system performance under tight hardware constraints. This paper aims to both document the assumed threat model and discuss its implications, with a focus on the ecosystem context in which Android exists. We analyze how different security measures in past and current Android implementations work together to mitigate these threats, and, where there are special cases in applying the security model in practice; we discuss these deliberate deviations and examine their impact.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Operating Systems</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotzs2KwjAUQOFsXIj6AK7MUoV2ktymSZYiOjOgKNh9SXITLFQr8Qd9-2GcWZ3d4SNkzFleaCnZh03P5pFzw4qcSalEn8yrY6CLM6auQbpv7S126UQPwd9Tc3vRbYehpVPBBMyGpBdtew2j_w5ItV5Vy69ss_v8Xi42mS2VyERAJSAwo2MJwoKKpXcWLUTO0YDUYBgWBr3iRquo0OkQtXE-Ss-NczAgk7_tG1tfUnOy6VX_ous3Gn4AkDA6iw</recordid><startdate>20190411</startdate><enddate>20190411</enddate><creator>Mayrhofer, René</creator><creator>Stoep, Jeffrey Vander</creator><creator>Brubaker, Chad</creator><creator>Hackborn, Dianne</creator><creator>Bonné, Bram</creator><creator>Tuncay, Güliz Seray</creator><creator>Jover, Roger Piqueras</creator><creator>Specter, Michael A</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20190411</creationdate><title>The Android Platform Security Model (2023)</title><author>Mayrhofer, René ; Stoep, Jeffrey Vander ; Brubaker, Chad ; Hackborn, Dianne ; Bonné, Bram ; Tuncay, Güliz Seray ; Jover, Roger Piqueras ; Specter, Michael A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a672-2ed723e098f632a37f6cbada3f11d9358390d49dc71987f7db8ef89bcf5c19bb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Operating Systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Mayrhofer, René</creatorcontrib><creatorcontrib>Stoep, Jeffrey Vander</creatorcontrib><creatorcontrib>Brubaker, Chad</creatorcontrib><creatorcontrib>Hackborn, Dianne</creatorcontrib><creatorcontrib>Bonné, Bram</creatorcontrib><creatorcontrib>Tuncay, Güliz Seray</creatorcontrib><creatorcontrib>Jover, Roger Piqueras</creatorcontrib><creatorcontrib>Specter, Michael A</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mayrhofer, René</au><au>Stoep, Jeffrey Vander</au><au>Brubaker, Chad</au><au>Hackborn, Dianne</au><au>Bonné, Bram</au><au>Tuncay, Güliz Seray</au><au>Jover, Roger Piqueras</au><au>Specter, Michael A</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The Android Platform Security Model (2023)</atitle><date>2019-04-11</date><risdate>2019</risdate><abstract>ACM Transactions on Privacy and Security, Volume 24, Issue 3, Article No. 19, 2021, pp 1-35 Android is the most widely deployed end-user focused operating system. With its growing set of use cases encompassing communication, navigation, media consumption, entertainment, finance, health, and access to sensors, actuators, cameras, or microphones, its underlying security model needs to address a host of practical threats in a wide variety of scenarios while being useful to non-security experts. To support this flexibility, Android's security model must strike a difficult balance between security, privacy, and usability for end users; provide assurances for app developers; and maintain system performance under tight hardware constraints. This paper aims to both document the assumed threat model and discuss its implications, with a focus on the ecosystem context in which Android exists. We analyze how different security measures in past and current Android implementations work together to mitigate these threats, and, where there are special cases in applying the security model in practice; we discuss these deliberate deviations and examine their impact.</abstract><doi>10.48550/arxiv.1904.05572</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1904.05572
ispartof
issn
language eng
recordid cdi_arxiv_primary_1904_05572
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Operating Systems
title The Android Platform Security Model (2023)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T04%3A13%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20Android%20Platform%20Security%20Model%20(2023)&rft.au=Mayrhofer,%20Ren%C3%A9&rft.date=2019-04-11&rft_id=info:doi/10.48550/arxiv.1904.05572&rft_dat=%3Carxiv_GOX%3E1904_05572%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true