Deakin University
Browse

File(s) under permanent embargo

Controlled Android Application Execution for the IoT Infrastructure

conference contribution
posted on 2016-01-01, 00:00 authored by Michael N Johnstone, Zubair BaigZubair Baig, Peter Hannay, Clinton Carpene, Malik Feroze
Android malware has grown in exponential proportions in recent times. Smartphone operating systems such as Android are being used to interface with and manage various IoT systems, such as building management and home automation systems. In such a hostile environment the ability to test and confirm device health claims is important to preserve confidentiality of user data. This paper describes a study to determine whether an Android device could be secured to prevent malware from executing in parallel with trusted applications. The research also sought to determine whether the system image could be protected from unauthorised modifications. A prototype scheme for meeting the above requirements was developed and tested. It was observed that the prototype succeeded in preventing unauthorised modification to the system image of the test device. However, the prototype failed to prevent unauthorised IPC calls when in single process mode.

History

Pagination

16-26

Location

Rome, Italy

Start date

2015-10-27

End date

2015-10-29

ISSN

1867-8211

ISBN-13

9783319470627

Language

eng

Publication classification

E1.1 Full written paper - refereed

Editor/Contributor(s)

Mandler B, MarquezBarja J, Campista MEM, Caganova D, Chaouchi H, Zeadally S, Badra M, Giordano S, Fazio M, Somov A, Vieriu RL

Title of proceedings

IoT360 2015 : Proceedings of the 2nd International Internet of Things Summit

Event

International Internet of Things. Summit (2015 : 2nd : Rome, Italy)

Publisher

Springer

Place of publication

Cham, Switzerland

Series

Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering; v.169