skip to main content
research-article

Performance analysis of security enforcement on Android operating system

Published: 02 November 2011 Publication History

Abstract

Google's Android platform has thrived in the smartphone market and has received a considerable amount of attention from mobile developers. Android's open platform encourages development of various applications and delivery systems, but this open source policy weakens dependability against various attacks. In this paper, we apply TOMOYO Linux, which provides MAC-based tools to Android for security enforcement. Because these security enforcement tools run at the kernel level, Android applications do not need to be modified. We also evaluate and analyze patched platforms on an evaluation board. The results show that our platform decreases the performance of the CPU and file operations by as much as 25% while not affecting memory management operations.

References

[1]
Shabtai, A., Fledel, Y., and Elovici, Y. 2010. Securing Android-Powered Mobile Devices Using SELinux. IEEE Mobile Computing, 36--44.
[2]
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., and Glezer, C. Google Android: A Comprehensive Security Assessment. IEEE Mobile Device Security, 35--44.
[3]
Apple's iOS, http://developer.apple.com/devcenter/ios.
[4]
Nokia's Symbian, http://symbian.nokia.com.
[5]
Samsung's bada platform, http://www.bada.com.
[6]
Google's Android platform, http://developer.android.com.
[7]
Shabtai, A., and Elovici, Y. Applying Behavioral Detection on Android-Based Devices. 2010. Mobile Wireless Middleware, Operating Systems, and Applications, 235--249.
[8]
Barrera, D., Kayacik, H., Oorschot, P., and Somayaji A. A methodology for empirical analysis of permission-based security models and its application to android. 2010. The 17th ACM conference on Computer and communications security, 73--84.
[9]
Enck, W., Ongtang, M., and McDaniel, P. On lightweight mobile phone application certification. 2009. The 16th ACM conference on Computer and communications security, 235--245.
[10]
TOMOYO Linux, http://tomoyo.sourceforge.jp.
[11]
Hobarth, S., and Mayrhofer, R. A framework for on-device privilege escalation exploits execution on Android. 2011. The third International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, 1--6.
[12]
Jeter, L., Mani, M., Reinschmidt, T., Smart Phone Malware: The danger and protective strategies. 2010

Cited By

View all
  • (2014)A Performance Analysis of ARM Virtual Machines Secured Using SELinuxCyber Security and Privacy10.1007/978-3-319-12574-9_3(28-36)Online publication date: 18-Nov-2014

Index Terms

  1. Performance analysis of security enforcement on Android operating system

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    RACS '11: Proceedings of the 2011 ACM Symposium on Research in Applied Computation
    November 2011
    355 pages
    ISBN:9781450310871
    DOI:10.1145/2103380
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • SIGAPP: ACM Special Interest Group on Applied Computing
    • ACCT: Association of Convergent Computing Technology
    • CUSST: University of Suwon: Center for U-city Security & Surveillance Technology of the University of Suwon
    • KIISE: Korean Institute of Information Scientists and Engineers
    • KISTI

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 November 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Android
    2. TOMOYO Linux
    3. performance analysis
    4. security

    Qualifiers

    • Research-article

    Conference

    RACS '11
    Sponsor:
    RACS '11: Research in Applied Computation Symposium
    November 2 - 5, 2011
    Florida, Miami

    Acceptance Rates

    Overall Acceptance Rate 393 of 1,581 submissions, 25%

    Upcoming Conference

    RACS '24

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)A Performance Analysis of ARM Virtual Machines Secured Using SELinuxCyber Security and Privacy10.1007/978-3-319-12574-9_3(28-36)Online publication date: 18-Nov-2014

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media