Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
AuDroid: preventing attacks on audio channels in mobile devices
Petracca G., Sun Y., Jaeger T., Atamli A.  ACSAC 2015 (Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, Dec 7-11, 2015)181-190.2015.Type:Proceedings
Date Reviewed: Jul 7 2016

Are you an Android operating system (OS) developer, exploring application-independent ways to secure the audio channels in a device? Petracca et al. have implemented one such scheme: AuDroid for Android OS. As of now, mobile OSs do not enforce flow control through microphone and speaker devices and have only limited access control. Consequently, malicious applications could snoop information flowing through the audio channels of the device. The authors propose an extension to the Android OS to enforce security policies and then implement it.

The authors evaluate AuDroid using six types of attack scenarios described in detail in the paper. The workings of the audio channels are also described. The paper presents a good literature survey of existing solution approaches and related work. The paper addresses three challenges in securing communications via audio channels: the dynamic creation of audio channels, the special functional requirements of apps, and communication with external parties whose identity (and intentions) may not be established. The paper goes on to describe threat and trust models, followed by a detailed design of AuDroid.

The paper treats the Android OS architecture relevant to audio stream architecture in some detail (version 5.0.1_r1). The implementation is validated using 17 widely used apps. The validation procedure details are reported and performance overhead analyzed. I could not find the source code of AuDroid at the location mentioned in the paper; however, it can be found using GitHub search. The authors claim that “the customization needed to integrate AuDroid in a vanilla Android OS distribution is [low].” Documentation coming with the source base is minimal. Still, this is a well-written implementation paper regarding an important problem and its solution.

Reviewer:  Sundara Nagarajan Review #: CR144553 (1609-0675)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy