Skip to main content

Showing 1–7 of 7 results for author: Petracca, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.13506  [pdf, other

    cs.CR

    PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage

    Authors: Yu-Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger

    Abstract: Android's filesystem access control is a crucial aspect of its system integrity. It utilizes a combination of mandatory access controls, such as SELinux, and discretionary access controls, like Unix permissions, along with specialized access controls such as Android permissions to safeguard OEM and Android services from third-party applications. However, when OEMs introduce differentiating feature… ▽ More

    Submitted 27 February, 2023; v1 submitted 26 February, 2023; originally announced February 2023.

    Comments: 14 pages, 5 figures, submitted to IEEE TDSC. arXiv admin note: substantial text overlap with arXiv:2008.03593

  2. arXiv:2008.03593  [pdf, other

    cs.CR

    PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems

    Authors: Yu-Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Daimeng Wang, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger

    Abstract: Android filesystem access control provides a foundation for Android system integrity. Android utilizes a combination of mandatory (e.g., SEAndroid) and discretionary (e.g., UNIX permissions) access control, both to protect the Android platform from Android/OEM services and to protect Android/OEM services from third-party apps. However, OEMs often create vulnerabilities when they introduce market-d… ▽ More

    Submitted 8 August, 2020; originally announced August 2020.

  3. arXiv:1808.05579  [pdf, other

    cs.CR cs.HC cs.OS

    Regulating Access to System Sensors in Cooperating Programs

    Authors: Giuseppe Petracca, Jens Grossklags, Patrick McDaniel, Trent Jaeger

    Abstract: Modern operating systems such as Android, iOS, Windows Phone, and Chrome OS support a cooperating program abstraction. Instead of placing all functionality into a single program, programs cooperate to complete tasks requested by users. However, untrusted programs may exploit interactions with other programs to obtain unauthorized access to system sensors either directly or through privileged servi… ▽ More

    Submitted 2 August, 2018; originally announced August 2018.

  4. arXiv:1802.02041  [pdf, other

    cs.CR

    A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

    Authors: Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac

    Abstract: The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, s… ▽ More

    Submitted 6 February, 2018; originally announced February 2018.

    Comments: Sensor-based Threats, Internet-of-Things, Smart Devices, Side Channel Attack

  5. arXiv:1606.02995  [pdf

    cs.CR

    Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices

    Authors: Ahmad-Atamli Reineh, Giuseppe Petracca, Janne Uusilehto, Andrew Martin

    Abstract: The emergence of mobile applications to execute sensitive operations has brought a myriad of security threats to both enterprises and users. In order to benefit from the large potential in smartphones there is a need to manage the risks arising from threats, while maintaining an easy interface for the users. In this paper we investigate the use of Trusted Platform Model (TPM) 2.0 to develop a secu… ▽ More

    Submitted 9 June, 2016; originally announced June 2016.

  6. arXiv:1604.02171  [pdf, ps, other

    cs.OS

    Aware: Controlling App Access to I/O Devices on Mobile Platforms

    Authors: Giuseppe Petracca, Ahmad Atamli, Yuqiong Sun, Jens Grossklags, Trent Jaeger

    Abstract: Smartphones' cameras, microphones, and device displays enable users to capture and view memorable moments of their lives. However, adversaries can trick users into authorizing malicious apps that exploit weaknesses in current mobile platforms to misuse such on-board I/O devices to stealthily capture photos, videos, and screen content without the users' consent. Contemporary mobile operating system… ▽ More

    Submitted 7 April, 2016; originally announced April 2016.

  7. arXiv:1604.00320  [pdf, ps, other

    cs.CR cs.OS

    AuDroid: Preventing Attacks on Audio Channels in Mobile Devices

    Authors: Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli, Trent Jaeger

    Abstract: Voice control is a popular way to operate mobile devices, enabling users to communicate requests to their devices. However, adversaries can leverage voice control to trick mobile devices into executing commands to leak secrets or to modify critical information. Contemporary mobile operating systems fail to prevent such attacks because they do not control access to the speaker at all and fail to co… ▽ More

    Submitted 1 April, 2016; originally announced April 2016.

    Comments: 2015 Annual Computer Security Applications Conference