Abstract
Third-party libraries are widely used in Android application development. While they extend functionality, third-party libraries are likely to pose a threat to users. Firstly, third-party libraries enjoy the same permissions as the applications; therefore libraries are overprivileged. Secondly, third-party libraries and applications share the same internal file space, so that applications’ files are exposed to thirdparty libraries. To solve these problems, a considerable amount of effort has been made. Unfortunately, the requirement for a modified Android framework makes their methods impractical. In this paper, a developer-friendly tool called LibCage is proposed, to prohibit permission abuse of third-party libraries and protect user privacy without modifying the Android framework or libraries’ bytecode. At its core, LibCage builds a sandbox for each third-party library in order to ensure that each library is subject to a separate permission set assigned by developers. Moreover, each library is allocated an isolated file space and has no access to other space. Importantly, LibCage works on Java reflection as well as dynamic code execution, and can defeat several possible attacks. We test on real-world third-party libraries, and the results show that LibCage is capable of enforcing a flexible policy on third-party libraries at run time with a modest performance overhead.
Cite
CITATION STYLE
Wang, F., Zhang, Y., Wang, K., Liu, P., & Wang, W. (2016). Stay in your Cage! a sound sandbox for third-party libraries on android. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9878 LNCS, pp. 458–476). Springer Verlag. https://doi.org/10.1007/978-3-319-45744-4_23
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.