A Taxonomy for Security Flaws in Event-Based Systems
Abstract
:1. Introduction
2. Background
2.1. Key Concepts
2.2. Event-Based Systems
2.3. Event Attacks
3. Taxonomy
3.1. Literature Review Methodology
3.2. Taxonomy Construction Methodology
3.3. Taxonomy
- F1. Trapdoor [40,45,47,56,72,79,86,87,89,90,92,93,103,105,109,110,111,112,113,115,117,118,119,120,121,122,125,126]: Due to an EBS’s flexibility and scalability, the system may contain the source code that allows someone to gain illicit access to the system, possibly at both the application and framework level. For example, a user may install an Android app comprising malicious code which directs to undesirable web site. Furthermore, an externally-developed framework for event-based communication may contain malicious code for allowing access to the system.
- F2. Conspirator [40,43,45,47,61,88,97,100,103,104,106,107,109,117,119,123,124,131,135,136]: EBSs may comprise components that collude by exchanging events to exploit the system functionalities or access sensitive resources. For example, in an Android system, a component belonging to an app that can access the Internet and a component belonging to an app that can access contact information could collude to send out the contact information over the Internet [47]. Furthermore, a component can help the other component indirectly access sensitive resources, such as photos, contacts, or text messages.
- F4. Covert Channel [47,100,119,123]: Two components that are not permitted to communicate via system-standard communication channels (e.g., event-based communication) communicate through the side-effects of the operations authorized for them. Covert channels are classified as intentional and non-malicious because they are not due to bugs in the system’s implementation, but due to the system’s design. Moreover, they mainly appeared in resource-sharing that are not maliciously designed in the system. This can happen either by means of manipulating storage, or by modulating the time which various operations take to perform. As EBSs can be deployed in various environments, such as mobile devices, the types of covert channels are diversified. For example, in Android systems, shared hardware resources such as audio volume, vibrator, and battery can be used as a communication channel between malicious components [137].
- F5. Open Event Channel [22,24,39,40,41,45,46,47,52,60,65,68,70,71,75,77,78,84,85,87,94,95,97,98,99,104,106,107,110,116,117,119,123,130,135,138,139]: This flaw exists when a component intentionally exposes its event communication channel to communicate with other components. Specifically, a component can advertise the types of event it can dispatch or open its event interfaces to share its functionality or data with other components. Although it would make a system more scalable and expandable, there exists a threat where malicious components can exploit the event communication channels in undesirable ways. For example, Android components can dispatch system-defined events to share their functionalities with others, but malicious components can intercept those events and exploit the functionalities [22].
- F6. Inadequate Concurrency [22,81,127,128]: A particular form of concurrency flaw exists in EBSs, called event anomalies [81]. In general, EBSs’ components randomly process the events that were received simultaneously. Specifically, if two different components simultaneously send the events that can access the same memory location (e.g., a variable containing state or data) of the target component, there is no guarantee that any one of the two events will be processed prior to the other. This flaw may allow spoofed events sent from malicious components to corrupt the victim component’s memory location [81].
- F7. Unsafe Event [22,24,39,40,41,45,46,52,60,64,68,69,70,71,75,77,78,79,82,85,94,95,97,98,101,102,107,110,117,130,135,138,139]: This flaw is caused when an event containing sensitive information is insufficiently protected. For example, if a component broadcasts an event containing sensitive information without any particular protection (e.g., encryption), malicious components may intercept or eavesdrop on the event and peek at the sensitive information [22].
- F8. Unsafe Event Interface [22,24,39,40,41,45,46,47,52,65,68,70,71,75,77,78,82,84,87,94,97,99,104,106,107,110,116,117,119,123,130,135,138,139]: If an event interface of a component has inadequate for filtering for handling received events, the component can be exposed to spoofed events. In case a component contains sensitive functionalities that can be triggered in response to receiving events through the unsafe interface, a malicious component can inject spoofed events to the exposed event interface thereby causing the target component to malfunction or operate in undesirable ways [22].
- F9. Inadequate Authentication [65,80,86,90,108,118,119,120]: Because of a low coupling between components in EBSs, this flaw exists when a system does not completely authenticate each component (e.g., checking if each component has sufficient permissions to send or receive events). This may allow malicious components to exploit event interactions in the system (e.g., intercepting or corrupting events). Moreover, in a multi-domain EBS, as the system may comprise multiple event brokers from different domains, the identification and authentication of components may not be uniform across the event broker networks [135], which may allow unsafe access between components.
- F10. Inadequate Resource Management [39,40,41,43,45,56,64,69,72,77,88,101,103,104,106,108,114,115,124,126,129,132,135]: To achieve scalability, EBSs can be deployed on distributed clusters of heterogeneous nodes, which causes complex resource management. This flaw is caused when a system allocates resources to a component and releases them in an untimely manner. For example, if resource allocation is not appropriately designed, a malicious component can monopolize the system resources, which can result in denial of service. Furthermore, inadequate dynamic allocation may lead to convert channels where malicious components can communicate with each other [140].
3.4. Relationship between Security Flaws and Event Attacks
4. Evaluation
5. Discussion
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Taylor, R.; Medvidovic, N.; Dashofy, E. Software Architecture: Foundations, Theory, and Practice; John Wiley & Sons: Hoboken, NJ, USA, 2009. [Google Scholar]
- Bonte, P.; Ongenae, F.; De Turck, F. Subset Reasoning for Event-Based Systems. IEEE Access 2019, 7, 107533–107549. [Google Scholar] [CrossRef]
- Kędzierski, D.; Matuszak, P. IoT System for Sensors Data Acquisition and Controlling Devices via Web; Technical Report; Wrocław University of Science and Technology: Wrocław, Poland, 2019. [Google Scholar]
- Ma, M.; Wang, P. Efficient Event Inference and Context-Awareness in Internet of Things Edge Systems. IEEE Trans. Big Data 2019. [Google Scholar] [CrossRef]
- Koldehofe, B. Principles of Building Scalable and Robust Event-Based Systems; Technical Report; Technische Universität Darmstadt: Darmstadt, Germany, 2019. [Google Scholar]
- Java Message Service (JMS). 2016. Available online: http://www.oracle.com/technetwork/java/jms/index.html (accessed on 16 September 2016).
- Android Open Source Project. 2015. Available online: https://source.android.com (accessed on 16 September 2016).
- Lee, E.A. Cyber Physical Systems: Design Challenges. In Proceedings of the IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), Orlando, FL, USA, 5–7 May 2008; pp. 363–369. [Google Scholar]
- Li, X.; Wang, Y.; Zhou, X. An event-based architecture for cyber physical systems. In Proceedings of the IEEE International Conference on Information Science and Technology (ICITS), Shenzhen, China, 26–28 April 2014; pp. 96–99. [Google Scholar]
- Ochoa, S.F.; Fortino, G.; Di Fatta, G. Cyber-Physical Systems, Internet of Things and Big Data. Future Gener. Comput. Syst. 2017, 5, 40. [Google Scholar] [CrossRef]
- Pu, C. A World of Opportunities: CPS, IOT, and Beyond. In Proceedings of the IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing, New York, NY, USA, 11–14 July 2011; pp. 229–230. [Google Scholar]
- Tan, Y.; Vuran, M.C.; Goddard, S.; Yu, Y.; Song, M.; Ren, S. A Concept Lattice-Based Event Model for Cyber-Physical Systems. In Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), Stockholm, Sweden, 12–15 April 2010; pp. 50–60. [Google Scholar]
- Ollesch, J.; Hesenius, M.; Gruhn, V. Engineering Events in CPS-Experiences and Lessons Learned. In Proceedings of the 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), Buenos Aires, Argentina, 21 May 2017; pp. 3–9. [Google Scholar]
- Rosenthal, F.; Jung, M.; Zitterbart, M.; Hanebeck, U.D. CoCPN–Towards Flexible and Adaptive Cyber-Physical Systems Through Cooperation. In Proceedings of the 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; pp. 1–6. [Google Scholar]
- Ollesch, J.; Hesenius, M.; Gruhn, V.; Alias, C. The Requirements Engineering Perspective on Events in Cyber-Physical Systems: Poster. In Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems, Barcelona, Spain, 19–23 June 2017; pp. 349–350. [Google Scholar]
- Eugster, P.; Felber, P.A.; Guerraoui, R.; Kermarrec, A.M. The Many Faces of Publish/Subscribe. ACM Comput. Surv. 2003, 35, 114–131. [Google Scholar] [CrossRef] [Green Version]
- Taylor, R.N.; Medvidovic, N.; Anderson, K.M.; Whitehead, E.J.; Robbins, J.E.; Nies, K.A.; Oreizy, P.; Dubrow, D.L. A Component- and Message-Based Architectural Style for GUI Software. IEEE Trans. Softw. Eng. 1996, 22, 390–406. [Google Scholar] [CrossRef]
- Cugola, G.; Di Nitto, E.; Fuggetta, A. The JEDI Event-Based Infrastructure and Its Application to the Development of the OPSS WFMS. ACM Comput. Surv. 2001, 27, 827–850. [Google Scholar] [CrossRef] [Green Version]
- Correira, J. Market Share: AIM and Portal Software, Worldwide, 2005; Gartner Market Research Report; Gartner Research: Stamford, CT, USA, 2006. [Google Scholar]
- Biscotti, F.; Raina, A. Market Share Analysis: Application Infrastructure and Middleware Software, Worldwide, 2011; Gartner Market Research Report; Gartner Research: Stamford, CT, USA, 2012. [Google Scholar]
- Mohamed, S.; Forshaw, M.; Thomas, N.; Dinn, A. Performance and Dependability Evaluation of Distributed Event-based Systems: A Dynamic Code-injection Approach. In Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering (ICPE), L’Aquila, Italy, 22–27 April 2017; pp. 349–352. [Google Scholar]
- Chin, E.; Felt, A.P.; Greenwood, K.; Wagner, D. Analyzing Inter-Application Communication in Android. In Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys), Washington, DC, USA, 28 June–1 July 2011; pp. 239–252. [Google Scholar]
- Lee, Y.K. Detecting Inter-Component Vulnerabilities in Event-based Systems. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 22–28. [Google Scholar] [CrossRef] [Green Version]
- Salvia, R.; Cortesi, A.; Ferrara, P.; Spoto, F. Intents Analysis of Android Apps for Confidentiality Leakage Detection. In Advanced Computing and Systems for Security; Springer: Berlin/Heidelberg, Germany, 2020; pp. 43–65. [Google Scholar]
- Weber, S.; Karger, P.A.; Paradkar, A. A Software Flaw Taxonomy: Aiming Tools at Security. SIGSOFT Softw. Eng. Notes 2005, 30, 1–7. [Google Scholar] [CrossRef]
- Landwehr, C.E.; Bull, A.R.; McDermott, J.P.; Choi, W.S. A Taxonomy of Computer Program Security Flaws. ACM Comput. Surv. 1994, 26, 211–254. [Google Scholar] [CrossRef]
- Sufatrio; Tan, D.J.J.; Chua, T.W.; Thing, V.L.L. Securing Android: A Survey, Taxonomy, and Challenges. ACM Comput. Surv. 2015, 47, 58:1–58:45. [Google Scholar] [CrossRef]
- Simmons, C.; Ellis, C.; Shiva, S.; Dasgupta, D.; Wu, Q. AVOIDIT: A Cyber Attack Taxonomy; Technical Report; University of Memphis: Memphis, TN, USA, 2009. [Google Scholar]
- Tsipenyuk, K.; Chess, B.; McGraw, G. Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors. IEEE Secur. Priv. 2005, 3, 81–84. [Google Scholar] [CrossRef] [Green Version]
- Jiwnani, K.; Zelkowitz, M. Susceptibility Matrix: A New Aid to Software Auditing. IEEE Secur. Priv. 2004, 2, 16–21. [Google Scholar] [CrossRef]
- Igure, V.M.; Williams, R.D. Taxonomies of Attacks and Vulnerabilities in Computer Systems. IEEE Commun. Surv. Tutor. 2008, 10, 6–19. [Google Scholar] [CrossRef]
- Joshi, C.; Singh, U.K. ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies. Int. J. Comput. Appl. 2014, 100, 30–36. [Google Scholar] [CrossRef]
- Aslam, T. A taxonomy of Security Faults in the Unix Operating System. Master’s Thesis, Purdue University, West Lafayette, IN, USA, 1995. [Google Scholar]
- Piessens, F. A Taxonomy of Causes of Software Vulnerabilities in Internet Software. In Proceedings of the Supplementary 13th International Symposium on Software Reliability Engineering (ISSRE), Annapolis, MD, USA, 12–15 November 2002; pp. 47–52. [Google Scholar]
- Linares-Vásquez, M.; Bavota, G.; Escobar-Velásquez, C. An Empirical Study on Android-related Vulnerabilities. In Proceedings of the 14th International Conference on Mining Software Repositories (MSR), Buenos Aires, Argentina, 20–21 May 2017; pp. 2–13. [Google Scholar] [CrossRef] [Green Version]
- Category:OWASP Top Ten 2017 Project. 2017. Available online: https://owasp.org/www-project-top-ten/ (accessed on 9 October 2017).
- Joshi, C.; Singh, U. A Review on Taxonomies of Attacks and Vulnerability in Computer and Network System. Int. J. 2015, 5, 742–747. [Google Scholar]
- Hui, Z.; Huang, S.; Ren, Z.; Yao, Y. Review of Software Security Defects Taxonomy. In Proceedings of the 5th International Conference on Rough Set and Knowledge Technology (RSKT), Beijing, China, 15–17 October 2010; pp. 310–321. [Google Scholar]
- Belokosztolszki, A.; Eyers, D.M.; Pietzuch, P.R.; Bacon, J.; Moody, K. Role-Based Access Control for Publish/Subscribe Middleware Architectures. In Proceedings of the 2nd International Workshop on Distributed Event-Based Systems (DEBS), San Diego, CA, USA, 8 June 2003; pp. 1–8. [Google Scholar]
- Shand, B.; Pietzuch, P.; Papagiannis, I.; Moody, K.; Migliavacca, M.; Eyers, D.; Bacon, J. Security Policy and Information Sharing in Distributed Event-Based Systems. In Reasoning in Event-Based Distributed Systems; Springer: Berlin/Heidelberg, Germany, 2011; pp. 151–172. [Google Scholar]
- Pesonen, L.I.W.; Eyers, D.M.; Bacon, J. Encryption-Enforced Access Control in Dynamic Multi-Domain Publish/Subscribe Networks. In Proceedings of the Inaugural International Conference on Distributed Event-based Systems (DEBS), Toronto, ON, Canada, 20–22 June 2007; pp. 104–115. [Google Scholar]
- Srivatsa, M.; Liu, L.; Iyengar, A. EventGuard: A System Architecture for Securing Publish-Subscribe Networks. ACM Trans. Comput. Syst. (TOCS) 2011, 29, 10:1–10:40. [Google Scholar] [CrossRef]
- Fiege, L.; Mezini, M.; Mühl, G.; Buchmann, A.P. Engineering Event-Based Systems with Scopes. In Proceedings of the 16th European Conference on Object-Oriented Programming (ECOOP), Malaga, Spain, 10–14 June 2002; pp. 309–333. [Google Scholar]
- Templeton, S.J.; Levitt, K.E. Detecting Spoofed Packets. In Proceedings of the DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 22–24 April 2003; Volume 1, pp. 164–175. [Google Scholar]
- Bagheri, H.; Sadeghi, A.; Garcia, J.; Malek, S. COVERT: Compositional Analysis of Android Inter-App Permission Leakage. IEEE Trans. Softw. Eng. 2015, 41, 866–886. [Google Scholar] [CrossRef]
- Bagheri, H.; Sadeghi, A.; Jabbarvand, R.; Malek, S. Automated Dynamic Enforcement of Synthesized Security Policies in Android; Technical Report GMU-CS-TR-2015-5; George Mason University: Fairfax, VA, USA, 2015. [Google Scholar]
- Bugiel, S.; Davi, L.; Dmitrienko, R.; Fischer, T. Towards Taming Privilege-Escalation Attacks on Android. In Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA, 5–8 February 2012. [Google Scholar]
- Mühl, G.; Fiege, L.; Pietzuch, P. Distributed Event-Based Systems; Springer Inc.: New York, NY, USA, 2006. [Google Scholar]
- Popescu, D.; Garcia, J.; Bierhoff, K.; Medvidovic, N. Impact Analysis for Distributed Event-based Systems. In Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems (DEBS), Berlin, Germany, 16–20 July 2012; pp. 241–251. [Google Scholar]
- Oreizy, P.; Medvidovic, N.; Taylor, R.N. Architecture-based Runtime Software Evolution. In Proceedings of the 20th International Conference on Software Engineering (ICSE), Kyoto, Japan, 19–25 April 1998; pp. 177–186. [Google Scholar]
- Garcia, J.; Popescu, D.; Safi, G.; Halfond, W.G.J.; Medvidovic, N. Identifying Message Flow in Distributed Event-Based Systems. In Proceedings of the 9th Joint Meeting on Foundations of Software Engineering (ESEC/FSE), Saint Petersburg, Russia, 18–26 August 2013; pp. 367–377. [Google Scholar]
- Bagheri, H.; Sadeghi, A.; Jabbarvand, R.; Malek, S. Practical, Formal Synthesis and Automatic Enforcement of Security Policies for Android. In Proceedings of the 46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Toulouse, France, 28 June–1 July 2016; pp. 514–525. [Google Scholar]
- Bugiel, S.; Davi, L.; Dmitrienko, A.; Fischer, T.; Sadeghi, A.R. XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks; Technical Report TR-2011-04; Technische Universität Darmstadt: Darmstadt, Germany, 2011. [Google Scholar]
- Zhang, R.; Cai, K.; Wonham, W.M. Delay-robustness in distributed control of timed discrete-event systems based on supervisor localization. In Proceedings of the 53rd IEEE Conference on Decision and Control, Los Angeles, CA, USA, 15–17 December 2014; pp. 6719–6724. [Google Scholar]
- Dolk, V.S.; Tesi, P.; Persis, C.D.; Heemels, W.P.M.H. Event-Triggered Control Systems Under Denial-of-Service Attacks. IEEE Trans. Control Netw. Syst. 2017, 4, 93–105. [Google Scholar] [CrossRef] [Green Version]
- Rasthofer, S.; Arzt, S.; Lovat, E.; Bodden, E. DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android. In Proceedings of the 9th International Conference on Availability, Reliability, and Security (ARES), Fribourg, Switzerland, 8–12 September 2014; pp. 40–49. [Google Scholar]
- Tripp, O.; Pistoia, M.; Cousot, P.; Cousot, R.; Guarnieri, S. ANDROMEDA: Accurate and Scalable Security Analysis of Web Applications. In Proceedings of the 16th International Conference on Fundamental Approaches to Software Engineering (FASE), Rome, Italy, 16–24 March 2013; pp. 210–225. [Google Scholar] [CrossRef]
- Sridharan, M.; Artzi, S.; Pistoia, M.; Guarnieri, S.; Tripp, O.; Berg, R. F4F: Taint Analysis of Framework-based Web Applications. In Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications (OOPSLA), Portland, OR, USA, 22–27 October 2011; pp. 1053–1068. [Google Scholar] [CrossRef]
- Pietzuch, P. Building Secure Event Processing Applications. In Proceedings of the First International Workshop on Algorithms and Models for Distributed Event Processing (AlMoDEP), Rome, Italy, 19 September 2011; p. 11. [Google Scholar] [CrossRef]
- Li, L.; Bartel, A.; Bissyandé, T.F.; Klein, J.; Le Traon, Y.; Arzt, S.; Rasthofer, S.; Bodden, E.; Octeau, D.; Mcdaniel, P. IccTA: Detecting Inter-Component Privacy Leaks in Android App. In Proceedings of the 37th International Conference on Software Engineering (ICSE), Florence, Italy, 16–24 May 2015; pp. 280–291. [Google Scholar]
- Demissie, B.F.; Ceccato, M.; Shar, L.K. Security analysis of permission re-delegation vulnerabilities in Android apps. In Empirical Software Engineering; Springer: Berlin/Heidelberg, Germany, 2020; pp. 1–53. [Google Scholar]
- Developer Error: The Most Dangerous Programming Mistakes|InfoWorld. 2016. Available online: http://www.infoworld.com/article/2622611/application-security/developer-error--the-most-dangerous-programming-mistakes.html (accessed on 25 September 2016).
- End User Device (EUD) Security Guidance. 2018. Available online: https://www.ncsc.gov.uk/collection/end-user-device-security/ (accessed on 17 November 2018).
- Petroni, F.; Querzoni, L.; Beraldi, R.; Paolucci, M. Exploiting User Feedback for Online Filtering in Event-based Systems. In Proceedings of the 31st Annual ACM Symposium on Applied Computing (SAC), Pisa, Italy, 4–8 April 2016; pp. 2021–2026. [Google Scholar] [CrossRef]
- Aniello, L.; Baldoni, R.; Ciccotelli, C.; Di Luna, G.A.; Frontali, F.; Querzoni, L. The Overlay Scan Attack: Inferring Topologies of Distributed Pub/Sub Systems Through Broker Saturation. In Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems (DEBS), Mumbai, India, 26–29 May 2014; pp. 107–117. [Google Scholar] [CrossRef]
- Tariq, M.A.; Koldehofe, B.; Altaweel, A.; Rothermel, K. Providing Basic Security Mechanisms in Broker-less Publish/Subscribe Systems. In Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems (DEBS), Cambridge, UK, 12–15 July 2010; pp. 38–49. [Google Scholar] [CrossRef]
- Srivatsa, M.; Liu, L. Secure Event Dissemination in Publish-Subscribe Networks. In Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS), Toronto, ON, Canada, 25–29 June 2007; p. 22. [Google Scholar] [CrossRef]
- Raiciu, C.; Rosenblum, D.S. Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures. In Proceedings of the Securecomm and Workshops (SecureComm), Baltimore, MD, USA, 28 August–1 September 2006; pp. 1–11. [Google Scholar]
- Nabeel, M.; Shang, N.; Bertino, E. Efficient Privacy Preserving Content Based Publish Subscribe Systems. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, USA, 20–22 June 2012; pp. 133–144. [Google Scholar] [CrossRef]
- Bacon, J.; Eyers, D.M.; Singh, J.; Pietzuch, P.R. Access Control in Publish/Subscribe Systems. In Proceedings of the Second International Conference on Distributed Event-Based Systems (DEBS), Rome, Italy, 1–4 July 2008; pp. 23–34. [Google Scholar] [CrossRef] [Green Version]
- Singh, J.; Bacon, J.; Eyers, D. Policy Enforcement Within Emerging Distributed, Event-based Systems. In Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems (DEBS), Bombay, Mumbai, India, 26–29 May 2014; pp. 246–255. [Google Scholar] [CrossRef]
- Dave, S.; Mahadevia, J.; Trivedi, B. Security Policy Implementation Using Connection and Event Log to Achieve Network Access Control. In Proceedings of the International Conference on Advances in Computing and Artificial Intelligence (ACAI), Freiburg, Germany, 7–10 June 2011; pp. 29–33. [Google Scholar] [CrossRef]
- Wun, A.; Jacobsen, H.A. A Policy Management Framework for Content-based Publish/Subscribe Middleware. In Proceedings of the ACM/IFIP/USENIX 2007 International Conference on Middleware (Middleware), Newport Beach, CA, USA, 26–30 November 2007; pp. 368–388. [Google Scholar]
- Singh, J.; Eyers, D.M.; Bacon, J. Disclosure Control in Multi-domain Publish/Subscribe Systems. In Proceedings of the 5th ACM International Conference on Distributed Event-based System (DEBS), Yorktown Heights, NY, USA, 11–14 July 2011; pp. 159–170. [Google Scholar] [CrossRef] [Green Version]
- Papagiannis, I.; Migliavacca, M.; Pietzuch, P.; Shand, B.; Eyers, D.; Bacon, J. PrivateFlow: Decentralised Information Flow Control in Event Based Middleware. In Proceedings of the Third ACM International Conference on Distributed Event-Based Systems (DEBS), Nashville, TN, USA, 6–9 July 2009; pp. 38:1–38:2. [Google Scholar] [CrossRef]
- Pietzuch, P.; Migliavacca, M.; Bacon, J.; Eyers, D.; Sigh, J.; Shand, B. Security in Multi-domain Event-based Systems. IT Inf. Technol. 2009, 51. [Google Scholar] [CrossRef] [Green Version]
- Bacon, J.; Moody, K.; Yao, W. A Model of OASIS Role-based Access Control and Its Support for Active Security. ACM Trans. Inf. Syst. Secur. 2002, 5, 492–540. [Google Scholar] [CrossRef] [Green Version]
- Fuchs, A.P.; Chaudhuri, A.; Foster, J.S. SCanDroid: Automated Security Certification of Android Applications; Technical Report; University of Maryland: College Park, MD, USA, 2009. [Google Scholar]
- Gibler, C.; Crussell, J.; Erickson, J.; Chen, H. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale. In Proceedings of the 5th International Conference on Trust and Trustworthy Computing (TRUST), Vienna, Austria, 13–15 June 2012; pp. 291–307. [Google Scholar]
- Zhou, Y.; Jiang, X. Detecting Passive Content Leaks and Pollution in Android Applications. In Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–27 February 2013. [Google Scholar]
- Safi, G.; Shahbazian, A.; Halfond, W.G.; Medvidovic, N. Detecting Event Anomalies in Event-Based Systems. In Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE), Bergamo, Italy, 30 August–4 September 2015; pp. 25–37. [Google Scholar]
- Enck, W.; Gilbert, P.; Chun, B.G.; Cox, L.P.; Jung, J.; McDaniel, P.; Sheth, A.N. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI), Vancouver, BC, Canada, 4–6 October 2010; pp. 393–407. [Google Scholar]
- Arzt, S.; Rasthofer, S.; Fritz, C.; Bodden, E.; Bartel, A.; Klein, J.; Le Traon, Y.; Octeau, D.; McDaniel, P. Flowdroid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps. In Proceedings of the 35th Annual ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Edinburgh, UK, 9–11 June 2014; pp. 259–269. [Google Scholar]
- Grace, M.C.; Zhou, Y.; Wang, Z.; Jiang, X. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA, 5–8 February 2012. [Google Scholar]
- Gordon, M.I.; Kim, D.; Perkins, J.H.; Gilham, L.; Nguyen, N.; Rinard, M.C. Information Flow Analysis of Android Applications in DroidSafe. In Proceedings of the 22nd Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA, 8–11 February 2015. [Google Scholar]
- Yang, Z.; Yang, M.; Zhang, Y.; Gu, G.; Ning, P.; Wang, X.S. AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection. In Proceedings of the ACM SIGSAC Conference on Computer Communications Security (CCS), Berlin, Germany, 4–8 November 2013; pp. 1043–1054. [Google Scholar]
- Chan, P.P.; Hui, L.C.; Yiu, S.M. DroidChecker: Analyzing Android Applications for Capability Leak. In Proceedings of the 5th Conference on Security and Privacy in Wireless and Mobile Networks (WISEC), Tucson, AZ, USA, 16–18 April 2012; pp. 125–136. [Google Scholar]
- Felt, A.P.; Chin, E.; Hanna, S.; Song, D.; Wagner, D. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 17–21 October 2011; pp. 627–638. [Google Scholar]
- Kim, J.; Yoon, Y.; Yi, K.; Shin, J. ScanDal: Static Analyzer for Detecting Privacy Leaks in Android Applications. In Proceedings of the Mob. Secur. Technol. (MoST), San Francisco, CA, USA, 24 May 2012. [Google Scholar]
- Yang, Z.; Yang, M. LeakMiner: Detect Information Leakage on Android with Static Taint Analysis. In Proceedings of the 3rd World Congress on Software Engineering (WCSE), London, UK, 4–6 July 2012; pp. 101–104. [Google Scholar]
- Yang, S.; Yan, D.; Wu, H.; Wang, Y.; Rountev, A. Static Control-Flow Analysis of User-driven Callbacks in Android Applications. In Proceedings of the 37th International Conference on Software Engineering (ICSE), Florence, Italy, 16–24 May 2015; pp. 89–99. [Google Scholar]
- Mann, C.; Starostin, A. A Framework for Static Detection of Privacy Leaks in Android Applications. In Proceedings of the 27th Symposium on Applied Computing (SAC), Trento, Italy, 26–30 March 2012; pp. 1457–1462. [Google Scholar]
- Huang, J.; Zhang, X.; Tan, L.; Wang, P.; Liang, B. AsDroid: Detecting Stealthy Behaviors in Android Applications by User Interface and Program Behavior Contradiction. In Proceedings of the 36th International Conference on Software Engineering (ICSE), Hyderabad, India, 31 May–7 June 2014; pp. 1036–1046. [Google Scholar]
- Wei, F.; Roy, S.; Ou, X.; Robby. Amandroid: A Precise and General Inter-Component Data Flow Analysis Framework for Security Vetting of Android Apps. ACM Trans. Priv. Secur. 2018, 21, 1–32. [Google Scholar] [CrossRef]
- Klieber, W.; Flynn, L.; Bhosale, A.; Jia, L.; Bauer, L. Android Taint Flow Analysis for App Sets. In Proceedings of the 3rd International Workshop on the State of the Art in Java Program Analysis (SOAP), Santa Barbara, CA, USA, 14 June 2016; pp. 1–6. [Google Scholar]
- Octeau, D.; Luchaup, D.; Dering, M.; Jha, S.; McDaniel, P. Composite Constant Propagation: Application to Android Inter-Component Communication Analysis. In Proceedings of the 37th International Conference on Software Engineering (ICSE), Florence, Italy, 16–24 May 2015; pp. 77–88. [Google Scholar]
- Octeau, D.; McDaniel, P.; Jha, S.; Bartel, A.; Bodden, E.; Klein, J.; Le Traon, Y. Effective Inter-component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In Proceedings of the 22nd USENIX Conference on Security (SEC), Washington, DC, USA, 14–16 August 2013; pp. 543–558. [Google Scholar]
- Li, L.; Bartel, A.; Klein, J.; Traon, Y.L.; Arzt, S.; Rasthofer, S.; Bodden, E.; Octeau, D.; Mcdaniel, P. I know what leaked in your pocket: Uncovering privacy leaks on Android Apps with Static Taint Analysis. arXiv 2014, arXiv:1404.7431. [Google Scholar]
- Li, L.; Bartel, A.; Klein, J.; Traon, Y.L. Automatically Exploiting Potential Component Leaks in Android Applications. In Proceedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM), Beijing, China, 24–26 September 2014; pp. 388–397. [Google Scholar]
- Ravitch, T.; Creswick, E.R.; Tomb, A.; Foltzer, A.; Elliott, T.; Casburn, L. Multi-App Security Analysis with FUSE: Statically Detecting Android App Collusion. In Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW), San Diego, CA, USA, 24 January 2014; pp. 4:1–4:10. [Google Scholar]
- Shen, F.; Vishnubhotla, N.; Todarka, C.; Arora, M.; Dhandapani, B.; Lehner, E.J.; Ko, S.Y.; Ziarek, L. Information Flows As a Permission Mechanism. In Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering (ASE), Vasteras, Sweden, 15–19 September 2014; pp. 515–526. [Google Scholar]
- Choi, K.; Chang, B.M. A Type and Effect System for Activation Flow of Components in Android Programs. Inf. Process. Lett. 2014, 114, 620–627. [Google Scholar] [CrossRef]
- Bartsch, S.; Berger, B.; Bunke, M.; Sohr, K. The Transitivity-of-Trust Problem in Android Application Interaction. In Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES), Regensburg, Bavaria, Germany, 2–6 September 2013; pp. 291–296. [Google Scholar]
- Zhongyang, Y.; Xin, Z.; Mao, B.; Xie, L. DroidAlarm: An All-Sided Static Analysis Tool for Android Privilege-Escalation Malware. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (CCS), Hangzhou, China, 7–10 May 2013; pp. 353–358. [Google Scholar]
- Ernst, M.D.; Just, R.; Millstein, S.; Dietl, W.; Pernsteiner, S.; Roesner, F.; Koscher, K.; Barros, P.B.; Bhoraskar, R.; Han, S.; et al. Collaborative Verification of Information Flow for a High-Assurance App Store. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, 3–7 November 2014; pp. 1092–1104. [Google Scholar]
- Wu, J.; Cui, T.; Ban, T.; Guo, S.; Cui, L. PaddyFrog: Systematically Detecting Confused Deputy Vulnerability in Android Applications. Secur. Commun. Netw. 2015, 8, 2338–2349. [Google Scholar] [CrossRef]
- Octeau, D.; Jha, S.; Dering, M.; McDaniel, P.; Bartel, A.; Li, L.; Klein, J.; Traon, Y.L. Combining Static Analysis with Probabilistic Models to Enable Market-Scale Android Inter-Component Analysis. In Proceedings of the 43rd Symposium on Principles of Programming Languages (POPL), St. Petersburg, FL, USA, 20–22 January 2016; pp. 469–484. [Google Scholar]
- Wu, L.; Grace, M.; Zhou, Y.; Wu, C.; Jiang, X. The Impact of Vendor Customizations on Android Security. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security (CCS), Berlin, Germany, 4–8 November 2013; pp. 623–634. [Google Scholar]
- Elish, K.O.; Yao, D.; Ryder, B.G. On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions. In Proceedings of the IEEE Mobile Security Technologies (MoST), in Conjunction with the IEEE Symposium on Security and Privacy, San Jose, CA, USA, 21 May 2015. [Google Scholar]
- Backes, M.; Gerling, S.; Hammer, C.; Maffei, M.; von Styp-Rekowsky, P. AppGuard: Enforcing User Requirements on Android Apps. In Proceedings of the 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Rome, Italy, 16–24 March 2013; pp. 543–548. [Google Scholar]
- Xu, R.; Saïdi, H.; Anderson, R. Aurasium: Practical Policy Enforcement for Android Applications. In Proceedings of the 21st USENIX Conference on Security Symposium (USENIX), Bellevue, WA, USA, 8–10 August 2012; pp. 539–552. [Google Scholar]
- Davis, B.; Sanders, B.; Khodaverdian, A.; Chen, H. I-ARM-Droid: A Rewriting Framework for In-App Reference Monitors for Android Applications. In Proceedings of the Mobile Security Technologies (MoST), San Francisco, CA, USA, 24 May 2012. [Google Scholar]
- Davis, B.; Chen, H. RetroSkeleton: Retrofitting Android Apps. In Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), Taipei, Taiwan, 25–28 June 2013; pp. 181–192. [Google Scholar]
- Jeon, J.; Micinski, K.K.; Vaughan, J.A.; Fogel, A.; Reddy, N.; Foster, J.S.; Millstein, T. Dr. Android and Mr. Hide: Fine-grained Permissions in Android Applications. In Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), Raleigh, NC, USA, 19 October 2012; pp. 3–14. [Google Scholar]
- Chen, K.Z.; Johnson, N.; Dai, S.; Macnamara, K.; Magrino, T.; Wu, E.; Rinard, M.; Song, D. Contextual Policy Enforcement in Android Applications with Permission Event Graphs. In Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA, 24–27 February 2013. [Google Scholar]
- Zhang, M.; Yin, H. Appsealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications. In Proceedings of the 21st Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA, 23–26 February 2014. [Google Scholar]
- Bartel, A.; Klein, J.; Monperrus, M.; Allix, K.; Le Traon, Y. Improving Privacy on Android Smartphones through In-Vivo Bytecode Instrumentation; Technical Report; University of Luxembourg: Luxembourg, 2012. [Google Scholar]
- Ongtang, M.; McLaughlin, S.; Enck, W.; McDaniel, P. Semantically rich application-centric security in Android. Secur. Commun. Netw. 2012, 5, 658–673. [Google Scholar] [CrossRef] [Green Version]
- Bugiel, S.; Heuser, S.; Sadeghi, A.R. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies. In Proceedings of the 22nd USENIX Conference on Security (USENIX Security), Washington, DC, USA, 14–16 August 2013; pp. 131–146. [Google Scholar]
- Zhao, Z.; Colon Osono, F.C. “TrustDroid™”: Preventing the Use of Smartphones for Information Leaking in Corporate Networks Through the Used of Static Analysis Taint Tracking. In Proceedings of the 7th International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, PR, USA, 16–18 October 2012; pp. 135–143. [Google Scholar]
- Enck, W.; Ongtang, M.; McDaniel, P. On Lightweight Mobile Phone Application Certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 9–13 November 2009; pp. 235–245. [Google Scholar]
- Schreckling, D.; Posegga, J.; Köstler, J.; Schaff, M. Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android. In Proceedings of the 6th IFIP International Conference on Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent (WISTP), Egham, UK, 20–22 June 2012; pp. 208–223. [Google Scholar]
- Dietz, M.; Shekhar, S.; Pisetsky, Y.; Shu, A.; Wallach, D.S. Quire: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Conference on Security (SEC), San Francisco, CA, USA, 8–11 August 2011; p. 23. [Google Scholar]
- Felt, A.P.; Wang, H.J.; Moshchuk, A.; Hanna, S.; Chin, E. Permission Re-delegation: Attacks and Defenses. In Proceedings of the 20th USENIX Conference on Security (SEC), San Francisco, CA, USA, 8–11 August 2011; p. 22. [Google Scholar]
- Hornyack, P.; Han, S.; Jung, J.; Schechter, S.; Wetherall, D. These Aren’t the Droids You’re Looking for: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, USA, 17–21 October 2011; pp. 639–652. [Google Scholar]
- Wang, X.; Sun, K.; Wang, Y.; Jing, J. DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. In Proceedings of the 22nd Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, USA, 8–11 February 2015. [Google Scholar]
- Hu, Y.; Neamtiu, I. Static Detection of Event-Based Races in Android Apps. In Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Williamsburg, VA, USA, 24–28 March 2018; pp. 257–270. [Google Scholar]
- Lau, P.T. Static detection of event-driven races in HTML5-based mobile apps. In International Conference on Verification and Evaluation of Computer and Communication Systems; Springer: Berlin/Heidelberg, Germany, 2019; pp. 32–46. [Google Scholar]
- Wu, H.; Qin, Z.; Tian, X.; Sun, E.; Xu, F.; Zhong, S. Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources. In Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing (DSC), Hangzhou, China, 18–20 November 2019; pp. 1–8. [Google Scholar]
- El-Zawawy, M.A.; Losiouk, E.; Conti, M. Do not let Next-Intent Vulnerability be your next nightmare: Type system-based approach to detect it in Android apps. Int. J. Inf. Sec. 2020, 1–20. [Google Scholar] [CrossRef]
- Casolare, R.; Martinelli, F.; Mercaldo, F.; Nardone, V.; Santone, A. Colluding Android Apps Detection via Model Checking. In Workshops of the International Conference on Advanced Information Networking and Applications; Springer: Berlin/Heidelberg, Germany, 2020; pp. 776–786. [Google Scholar]
- Mahesh, P.S.; Muthumanickam, K. A Security Scheme for Discovering Battery Draining Attacks in Android Smartphone. In ICDSMLA 2019; Springer: Berlin/Heidelberg, Germany, 2020; pp. 1908–1915. [Google Scholar]
- Kitchenham, B. Procedures for Performing Systematic Reviews; Keele University: Keele, UK, 2004; Volume 33, pp. 1–26. [Google Scholar]
- Howard, J.D. An Analysis of Security Incidents on the Internet 1989–1995; Technical Report; Carnegie-Mellon Univiersity: Pittsburgh, PA, USA, 1997. [Google Scholar]
- Bacon, J.; Eyers, D.; Singh, J.; Shand, B.; Migliavacca, M.; Pietzuch, P. Security in Multi-domain Event-based Systems Sicherheit in ereignis-basierten Mehrdomänensystemen. IT Inf. Technol. 2009, 51, 277–284. [Google Scholar]
- Chen, H.; Su, J.; Qiao, L.; Xin, Q. Malware collusion attack against SVM: Issues and countermeasures. Appl. Sci. 2018, 8, 1718. [Google Scholar] [CrossRef] [Green Version]
- Rangwala, M.; Zhang, P.; Zou, X.; Li, F. A Taxonomy of Privilege Escalation Attacks in Android Applications. Int. J. Secur. Netw. 2014, 9, 40–55. [Google Scholar] [CrossRef] [Green Version]
- Roy, S.; Chaulagain, D.; Bhusal, S. Static Analysis for Security Vetting of Android Apps. In From Database to Cyber Security; Springer: Berlin/Heidelberg, Germany, 2018; pp. 375–404. [Google Scholar]
- Garcia, J.; Hammad, M.; Ghorbani, N.; Malek, S. Automatic Generation of Inter-Component Communication Exploits for Android Applications. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering (ESEC/FSE), Paderborn, Germany, 6–8 September 2017; pp. 661–671. [Google Scholar]
- Portokalidis, G.; Homburg, P.; Anagnostakis, K.; Bos, H. Paranoid Android: Versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), Austin, TX, USA, 6–10 December 2010; pp. 347–356. [Google Scholar]
- android.App|Android Developers. 2016. Available online: http://developer.android.com/reference/android/app/package-summary.html (accessed on 16 August 2016).
- Li, L.; Bissyandé, T.F.; Papadakis, M.; Rasthofer, S.; Bartel, A.; Octeau, D.; Klein, J.; Traon, L. Static analysis of android apps: A systematic literature review. Inf. Softw. Technol. 2017, 88, 67–95. [Google Scholar] [CrossRef] [Green Version]
- Fuentes Carranza, J.C.; Fong, P.W.L. Brokering Policies and Execution Monitors for IoT Middleware. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT), Toronto, ON, Canada, 4–6 June 2019; Association for Computing Machinery: New York, NY, USA; pp. 49–60. [Google Scholar]
- Pistoia, M.; Fink, S.J.; Flynn, R.J.; Yahav, E. When Role Models Have Flaws: Static Validation of Enterprise Security Policies. In Proceedings of the 29th International Conference on Software Engineering (ICSE), Minneapolis, MN, USA, 19–27 May 2007; pp. 478–488. [Google Scholar] [CrossRef] [Green Version]
- Lee, B.; Kim, S.M.; Park, E.; Han, D. MemScope: Analyzing Memory Duplication on Android Systems. In Proceedings of the 6th Asia-Pacific Workshop on Systems (APSys), Tokyo, Japan, 27–28 July 2015; pp. 19:1–19:7. [Google Scholar]
- Silva, A.; Simmonds, J. BehaviorDroid: Monitoring Android Applications. In Proceedings of the International Conference on Mobile Software Engineering and Systems (MOBILESoft), Austin, TX, USA, 16–17 May 2016; pp. 19–20. [Google Scholar]
- Sahu, M.K.; Ahirwar, M.; Hemlata, A. A Review of Malware Detection Based on Pattern Matching Technique. Int. J. Comput. Sci. Inf. Technol. 2014, 5, 944–947. [Google Scholar]
- Wu, H.; Schwab, S.; Peckham, R.L. Signature Based Network Intrusion Detection System and Method. U.S. Patent 7,424,744, 9 September 2008. [Google Scholar]
- Anjum, F.; Subhadrabandhu, D.; Sarkar, S. Signature based intrusion detection for wireless ad-hoc networks: A comparative study of various routing protocols. In Proceedings of the Vehicular Technology Conference (VTC), Jeju, Korea, 22–25 April 2003; Volume 3, pp. 2152–2156. [Google Scholar]
No. | Attack Type | Definition |
---|---|---|
A1 | Spoofing | For where and and contains f) and (: sent a spoofed e to to exploit f in |
A2 | Interception | For where and and (e contains s) and (): intercepted e, which was supposed to be sent to , to obtain s |
A3 | Eavesdropping | For where and and (e contains s) and (): eavesdropped on e, which was supposed to be open only to , to obtain s |
A4 | Confused deputy | For where and and contains f) and (: accessed by accessing , which can access , to exploit f in |
A5 | Collusion | For where and and contains f) and (: colluded with , which can access , to exploit f in |
A6 | Flooding | For where and and ( (the number of is overwhelmingly greater than the average number of : sent an overwhelming number of to hinder from accessing |
A7 | Delaying | For where and and ( (the time interval between e and is overwhelmingly larger than the time interval between and ): delayed the publication of to make and malfunction |
D: Domain Keyword | A: Attribute Keyword | IEEE | ACM | Springer | Google Scholar |
---|---|---|---|---|---|
distributed event-based systems, event-based systems, android event, android intent | security vulnerability, security attack, security flaw, security error | 104 | 624 | 1188 | 3078 |
Initially Searched | 4994 | ||||
After 1st Filtering | 2018 | ||||
After 2nd Filtering | 780 | ||||
After Final Filtering | 84 |
No. | Security Flaw in EBS | Event Attack | Existing Solution |
---|---|---|---|
F1 | Trapdoor | - | - |
F2 | Conspirator | A5 | - Detection of information leaks [46,60,142] - Detection and control of colluding apps [47] |
F3 | Logic/Time Bomb | - | - |
F4 | Covert Channel | - | - |
F5 | Open Event Channel | A1-7 | - Encryption of events [41] - Policy enforcement [46,47,71,143] |
F6 | Inadequate Concurrency | A1 | - Detection of event anomalies [68] |
F7 | Unsafe Event | A2,3,7 | - Role-based access control [39,135] - Encryption of events [41] - Detection of vulnerable components [22,45,46,142] - Policy enforcement [46,47,71,143] |
F8 | Unsafe Event Interface | A1,4,6 | - Role-based access control [39,135] - Detection of vulnerable components [22,45,46,142] - Policy enforcement [46,47,71,143] |
F9 | Inadequate Authentication | A1-7 | - Security policy validation [39,144] |
F10 | Inadequate Resource Management | A6-7 | - Analysis of runtime events and resources [145,146] |
No. | Security Flaw in EBS | Weber’s [25] | OWASP [36] | Tsipenyuk’s [29] | Linares-Vásquez’s [35] |
---|---|---|---|---|---|
F1 | Trap door | ∘ | ∘ | ∘ | ∘ |
F2 | Conspirator | ||||
F3 | Logic/Time Bomb | • | |||
F4 | Covert Channel | ∘ | |||
F5 | Open Event Channel | ||||
F6 | Inadequate Concurrency | ∘ | |||
F7 | Unsafe Event | ∘ | ∘ | ||
F8 | Unsafe Event Interface | ∘ | ∘ | ∘ | |
F9 | Inadequate Authentication | ∘ | |||
F10 | Inadequate Resource Management | ∘ | ∘ | • |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, Y.K.; Kim, D. A Taxonomy for Security Flaws in Event-Based Systems. Appl. Sci. 2020, 10, 7338. https://doi.org/10.3390/app10207338
Lee YK, Kim D. A Taxonomy for Security Flaws in Event-Based Systems. Applied Sciences. 2020; 10(20):7338. https://doi.org/10.3390/app10207338
Chicago/Turabian StyleLee, Youn Kyu, and Dohoon Kim. 2020. "A Taxonomy for Security Flaws in Event-Based Systems" Applied Sciences 10, no. 20: 7338. https://doi.org/10.3390/app10207338