SaTC: CORE: Small: Collaborative: Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms
SaTC:核心:小型:协作:实现移动平台上中间件的精确和自动不安全分析
基本信息
- 批准号:1815144
- 负责人:
- 金额:$ 15.9万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2018
- 资助国家:美国
- 起止时间:2018-10-01 至 2021-09-30
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
During the past decade, middleware on mobile platforms (such as the Application Framework in Android and the Core Services layer in iOS) has been flourishing, but the insecurity analysis of such middleware has been lagging behind. For example, while comprehensive studies have been conducted at the application layer of the Android system, there is very limited work analyzing the Android Application Framework (Android Framework, for short), a middleware layer in the Android system. The two billion Android mobile devices and the many Android Things devices all rely on the system services provided by Android Framework. Recently, many vulnerabilities of Android Framework are exposed, showing that Android Framework is vulnerable and exploitable. Given the critical role of Android Framework, a vulnerability in the framework can be exploited to launch large-scale cyber attacks and cause serious harms to user security and privacy. However, the insecurity analysis of Android Framework has been rather ad hoc, imprecise, and requires much manual effort, mainly because there is a severe lack of techniques and tools developed for insecurity analysis of such middleware on mobile platforms (MoMP). This research project seeks to fill the gap by developing new techniques and tools for insecurity analysis of MoMP like Android Framework and consequently lead to more secure and trustworthy computing environments for the huge number of smartphone and Internet-of-Things (IoT) device users. Educational resources developed in this project, including course modules on mobile computing security and vulnerability discovery, will be disseminated through a dedicated web site. Collaborations with the industry will be sought to transfer the technology to interested software companies and government entities that perform insecurity analysis of MoMP.The project will develop new architectural designs, algorithms and techniques for precise and automated insecurity analysis of MoMP. To make the research concrete, demonstrations will be created for the Android Framework for mobile smartphones, tablets and IoT devices, and the first platform for precise and automated insecurity analysis of Android Framework will be built, combining current software analysis techniques, such as symbolic execution, hybrid dynamic/static analysis, and cross-process and cross-layer software analysis, to make them capable of analyzing complex and large-sized MoMP like Android Framework. The platform will be evaluated and applied to discovering various types of zero-day vulnerabilities and generating proof-of-concept exploits.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
在过去的十年中,移动的平台上的中间件(如Android的应用框架和iOS的核心服务层)蓬勃发展,但对这类中间件的安全性分析却相对滞后。例如,虽然在Android系统的应用层已经进行了全面的研究,但是分析Android系统中的中间件层Android应用框架(简称Android框架)的工作非常有限。20亿台Android移动的设备和众多Android Things设备都依赖于Android Framework提供的系统服务。最近,Android Framework的多个漏洞被曝光,说明Android Framework是脆弱和可利用的。鉴于Android框架的关键作用,框架中的漏洞可以被利用来发动大规模网络攻击,并对用户安全和隐私造成严重危害。然而,Android框架的不安全性分析一直是相当特设的,不精确的,并需要大量的手工工作,主要是因为有严重缺乏的技术和工具开发的不安全性分析这样的中间件在移动的平台(MoMP)。该研究项目旨在通过开发新的技术和工具来填补MoMP(如Android Framework)的不安全性分析的差距,从而为大量智能手机和物联网(IoT)设备用户提供更安全和更值得信赖的计算环境。该项目开发的教育资源,包括关于移动的计算安全和脆弱性发现的课程单元,将通过一个专门网站传播。该项目将寻求与业界的合作,将技术转让给对MoMP进行不安全分析的感兴趣的软件公司和政府实体。该项目将开发新的架构设计,算法和技术,用于精确和自动化的MoMP不安全分析。为了使研究具体化,将为移动的智能手机,平板电脑和物联网设备创建Android Framework的演示,并将构建第一个精确和自动化Android Framework不安全分析的平台,结合当前的软件分析技术,如符号执行,混合动态/静态分析,跨进程和跨层软件分析,使他们能够分析像Android Framework这样复杂和大型的MoMP。该平台将被评估并应用于发现各种类型的零日漏洞和生成概念验证漏洞。该奖项反映了NSF的法定使命,并通过使用基金会的知识价值和更广泛的影响审查标准进行评估而被认为值得支持。
项目成果
期刊论文数量(11)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples
- DOI:10.1109/dsn.2019.00019
- 发表时间:2018-12
- 期刊:
- 影响因子:0
- 作者:Qiang Zeng;Jianhai Su;Chenglong Fu;Golam Kayas;Lannan Luo
- 通讯作者:Qiang Zeng;Jianhai Su;Chenglong Fu;Golam Kayas;Lannan Luo
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection
- DOI:10.14722/ndss.2021.24464
- 发表时间:2021-01
- 期刊:
- 影响因子:0
- 作者:Haotian Chi;Qiang Zeng;Xiaojiang Du;Lannan Luo
- 通讯作者:Haotian Chi;Qiang Zeng;Xiaojiang Du;Lannan Luo
T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices
- DOI:10.1145/3372297.3417286
- 发表时间:2020-10
- 期刊:
- 影响因子:0
- 作者:Xiaopeng Li;Qiang Zeng;Lannan Luo;Tongbo Luo
- 通讯作者:Xiaopeng Li;Qiang Zeng;Lannan Luo;Tongbo Luo
Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices
- DOI:10.1145/3300061.3345434
- 发表时间:2019-08
- 期刊:
- 影响因子:0
- 作者:Xiaopeng Li;Fengyao Yan;F. Zuo;Qiang Zeng;Lannan Luo
- 通讯作者:Xiaopeng Li;Fengyao Yan;F. Zuo;Qiang Zeng;Lannan Luo
Heap Memory Snapshot Assisted Program Analysis for Android Permission Specification
Android权限规范的堆内存快照辅助程序分析
- DOI:10.1109/saner48275.2020.9054795
- 发表时间:2020
- 期刊:
- 影响因子:0
- 作者:Luo, Lannan
- 通讯作者:Luo, Lannan
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Lannan Luo其他文献
Countermeasures Against L0 Adversarial Examples Using Image Processing and Siamese Networks
使用图像处理和连体网络针对 L0 对抗性示例的对策
- DOI:
- 发表时间:
2018 - 期刊:
- 影响因子:0
- 作者:
F. Zuo;Lannan Luo;Qiang Zeng - 通讯作者:
Qiang Zeng
AEPecker: L0 Adversarial Examples are not Strong Enough
AEPecker:L0 对抗性示例不够强大
- DOI:
- 发表时间:
2018 - 期刊:
- 影响因子:0
- 作者:
F. Zuo;Bokai Yang;Xiaopeng Li;Lannan Luo;Qiang Zeng - 通讯作者:
Qiang Zeng
Lannan Luo的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Lannan Luo', 18)}}的其他基金
SaTC: CORE: Small: Semantics-Oriented Binary Code Analysis Learning from Recent Advances in Deep Learning
SaTC:核心:小型:面向语义的二进制代码分析从深度学习的最新进展中学习
- 批准号:
2304720 - 财政年份:2022
- 资助金额:
$ 15.9万 - 项目类别:
Standard Grant
SaTC: CORE: Small: Semantics-Oriented Binary Code Analysis Learning from Recent Advances in Deep Learning
SaTC:核心:小型:面向语义的二进制代码分析从深度学习的最新进展中学习
- 批准号:
1953073 - 财政年份:2020
- 资助金额:
$ 15.9万 - 项目类别:
Standard Grant
CRII: SaTC: A Malware-Inspired Approach to Mobile Application Repackaging and Tampering Detection
CRII:SaTC:一种受恶意软件启发的移动应用程序重新打包和篡改检测方法
- 批准号:
1850278 - 财政年份:2019
- 资助金额:
$ 15.9万 - 项目类别:
Standard Grant
相似国自然基金
胆固醇羟化酶CH25H非酶活依赖性促进乙型肝炎病毒蛋白Core及Pre-core降解的分子机制研究
- 批准号:82371765
- 批准年份:2023
- 资助金额:50 万元
- 项目类别:面上项目
锕系元素5f-in-core的GTH赝势和基组的开发
- 批准号:22303037
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
基于合成致死策略搭建Core-matched前药共组装体克服肿瘤耐药的机制研究
- 批准号:
- 批准年份:2022
- 资助金额:52 万元
- 项目类别:
鼠伤寒沙门氏菌LPS core经由CD209/SphK1促进树突状细胞迁移加重炎症性肠病的机制研究
- 批准号:
- 批准年份:2022
- 资助金额:30 万元
- 项目类别:青年科学基金项目
基于外泌体精准调控的“核-壳”(core-shell)同步血管化骨组织工程策略的应用与机制探讨
- 批准号:
- 批准年份:2020
- 资助金额:55 万元
- 项目类别:
肌营养不良蛋白聚糖Core M3型甘露糖肽的精确制备及功能探索
- 批准号:92053110
- 批准年份:2020
- 资助金额:70.0 万元
- 项目类别:重大研究计划
Core-1-O型聚糖黏蛋白缺陷诱导胃炎发生并介导慢性胃炎向胃癌转化的分子机制研究
- 批准号:81902805
- 批准年份:2019
- 资助金额:20.5 万元
- 项目类别:青年科学基金项目
原始地球增生晚期的Core-merging大碰撞事件:地核增生、核幔平衡与核幔边界结构的新认识
- 批准号:41973063
- 批准年份:2019
- 资助金额:65.0 万元
- 项目类别:面上项目
RBM38通过协助Pol-ε结合、招募core调控HBV复制
- 批准号:31900138
- 批准年份:2019
- 资助金额:24.0 万元
- 项目类别:青年科学基金项目
CORDEX-CORE区域气候模拟与预估研讨会
- 批准号:41981240365
- 批准年份:2019
- 资助金额:1.5 万元
- 项目类别:国际(地区)合作与交流项目
相似海外基金
SaTC: CORE: Small: An evaluation framework and methodology to streamline Hardware Performance Counters as the next-generation malware detection system
SaTC:核心:小型:简化硬件性能计数器作为下一代恶意软件检测系统的评估框架和方法
- 批准号:
2327427 - 财政年份:2024
- 资助金额:
$ 15.9万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338301 - 财政年份:2024
- 资助金额:
$ 15.9万 - 项目类别:
Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338302 - 财政年份:2024
- 资助金额:
$ 15.9万 - 项目类别:
Continuing Grant
SaTC: CORE: Small: NSF-DST: Understanding Network Structure and Communication for Supporting Information Authenticity
SaTC:核心:小型:NSF-DST:了解支持信息真实性的网络结构和通信
- 批准号:
2343387 - 财政年份:2024
- 资助金额:
$ 15.9万 - 项目类别:
Standard Grant
NSF-NSERC: SaTC: CORE: Small: Managing Risks of AI-generated Code in the Software Supply Chain
NSF-NSERC:SaTC:核心:小型:管理软件供应链中人工智能生成代码的风险
- 批准号:
2341206 - 财政年份:2024
- 资助金额:
$ 15.9万 - 项目类别:
Standard Grant
Collaborative Research: SaTC: CORE: Small: Towards Secure and Trustworthy Tree Models
协作研究:SaTC:核心:小型:迈向安全可信的树模型
- 批准号:
2413046 - 财政年份:2024
- 资助金额:
$ 15.9万 - 项目类别:
Standard Grant
SaTC: CORE: Small: Socio-Technical Approaches for Securing Cyber-Physical Systems from False Claim Attacks
SaTC:核心:小型:保护网络物理系统免受虚假声明攻击的社会技术方法
- 批准号:
2310470 - 财政年份:2023
- 资助金额:
$ 15.9万 - 项目类别:
Standard Grant
SaTC: CORE: Small: Study, Detection and Containment of Influence Campaigns
SaTC:核心:小型:影响力活动的研究、检测和遏制
- 批准号:
2321649 - 财政年份:2023
- 资助金额:
$ 15.9万 - 项目类别:
Standard Grant
Collaborative Research: SaTC: CORE: Small: Investigation of Naming Space Hijacking Threat and Its Defense
协作研究:SaTC:核心:小型:命名空间劫持威胁及其防御的调查
- 批准号:
2317830 - 财政年份:2023
- 资助金额:
$ 15.9万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Small: Towards a Privacy-Preserving Framework for Research on Private, Encrypted Social Networks
协作研究:SaTC:核心:小型:针对私有加密社交网络研究的隐私保护框架
- 批准号:
2318843 - 财政年份:2023
- 资助金额:
$ 15.9万 - 项目类别:
Continuing Grant