Int J Performability Eng ›› 2019, Vol. 15 ›› Issue (6): 1631-1641.doi: 10.23940/ijpe.19.06.p14.16311641

Previous Articles     Next Articles

Role Behavior Detection Method of Privilege Escalation Attacks for Android Applications

Hui Lia,b,*, Limin Shena, Chuan Maa, and Mingyuan Liua   

  1. a School of Information Science and Engineering, Yanshan University, Qinhuangdao, 066004, China
    b School of Business Administration, Hebei Normal University of Science and Technology, Qinhuangdao, 066004, China
  • Submitted on ;
  • Contact: * E-mail address:
  • About author:Hui Li is a doctoral student in the School of Computer Science and Technology at Yanshan University. Her research interests include information security, mobile application security, and mobile information systems.Limin Shen graduated from the School of Computer Science and Technology at Yanshan University with a Ph.D. He visited Illinois Institute of Technology in the U.S.A. for collaborative research from 2005 to 2007. He is currently a professor and Ph.D. supervisor at Yanshan University. He is also a senior member of CCF and a member of the China Software Engineering Professional Committee. His current research interests include information security, collaborative computing, and system integration.Chuan Ma received his doctoral degree in computer science and technology from Yanshan University. His research interests include information security and mobile security.Mingyuan Liu is a master's student in the School of Computer Science and Technology at Yanshan University. Her research interests include information security and network security.
  • Supported by:
    This work was partly financially supported through grants from the National Natural Science Foundation of China (No. 61772450), Natural Science Foundation of Hebei Province (No. F2017203307, F2016203290), Science and Technology Project of Hebei Province (No.17210701D), and Youth Fund for Science and Technology Research of Institution of Higher Education in Hebei Province (No. QN2016073).

Abstract: For privilege escalation attacks in the Android system, the detection method of role behavior was proposed based on component features and process algebra. The classification of roles was constructed from the analysis of the privilege escalation attack model. Feature extraction from components includes component permissions, component communication, API calls, and sensitive data flow. Process algebra was used to construct modes of role behavior, and roles of applications were identified through equivalence relation. Finally, the dangerous path was detected in multi-applications, and then applications constituting to privilege escalation attacks were ascertained. The experiment showed that the proposed method can effectively detect privilege escalation attacks, the potential safe hazards in applications were pointed out, and the role of applications was identified.

Key words: Android, privilege escalation attack, role behavior, detection method, process algebra