Title: A taxonomy of privilege escalation attacks in Android applications

Authors: Mohammed Rangwala; Ping Zhang; Xukai Zou; Feng Li

Addresses: Department of Computer and Information Science, Indiana University Purdue University Indianapolis, Indianapolis, IN 46202, USA ' Department of Computer Science and Engineering, Henan Institute of Engineering, Zhengzhou, HN 451191, China ' Department of Computer and Information Science, Indiana University Purdue University Indianapolis, Indianapolis, IN 46202, USA ' Department of Computer and Information Technology, Indiana University Purdue University Indianapolis, Indianapolis, IN 46202, USA

Abstract: Google's Android is one of the most popular mobile operating system platforms today, being deployed on a wide range of mobile devices from various manufacturers. It is termed as a privilege-separated operating system which implements some novel security mechanisms. Recent research and security attacks on the platform, however, have shown that the security model of Android is flawed and is vulnerable to transitive usage of privileges among applications. Privilege escalation attacks have been shown to be malicious and with the wide spread and growing use of the system, the platform for these attacks is also growing wider. This provides a motivation to design and implement better security frameworks and mechanisms to mitigate these attacks. This paper discusses; 1) the security features currently provided by the Android platform; 2) a definition, few working examples and classifications of privilege escalation attacks in Android applications; 3) a classification and comparison of different frameworks and security extensions proposed in recent research.

Keywords: privilege escalation attacks; Android applications; smartphones; smartphone security; mobile devices; Android security.

DOI: 10.1504/IJSN.2014.059327

International Journal of Security and Networks, 2014 Vol.9 No.1, pp.40 - 55

Received: 04 Oct 2013
Accepted: 05 Oct 2013

Published online: 17 Feb 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article