SaTC: CORE: Small: Collaborative: Enabling Precise and Automated Insecurity Analysis of Middleware on Mobile Platforms
SaTC:核心:小型:协作:实现移动平台上中间件的精确和自动不安全分析
基本信息
- 批准号:1814679
- 负责人:
- 金额:$ 16.55万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2018
- 资助国家:美国
- 起止时间:2018-10-01 至 2022-09-30
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
During the past decade, middleware on mobile platforms (such as the Application Framework in Android and the Core Services layer in iOS) has been flourishing, but the insecurity analysis of such middleware has been lagging behind. For example, while comprehensive studies have been conducted at the application layer of the Android system, there is very limited work analyzing the Android Application Framework (Android Framework, for short), a middleware layer in the Android system. The two billion Android mobile devices and the many Android Things devices all rely on the system services provided by Android Framework. Recently, many vulnerabilities of Android Framework are exposed, showing that Android Framework is vulnerable and exploitable. Given the critical role of Android Framework, a vulnerability in the framework can be exploited to launch large-scale cyber attacks and cause serious harms to user security and privacy. However, the insecurity analysis of Android Framework has been rather ad hoc, imprecise, and requires much manual effort, mainly because there is a severe lack of techniques and tools developed for insecurity analysis of such middleware on mobile platforms (MoMP). This research project seeks to fill the gap by developing new techniques and tools for insecurity analysis of MoMP like Android Framework and consequently lead to more secure and trustworthy computing environments for the huge number of smartphone and Internet-of-Things (IoT) device users. Educational resources developed in this project, including course modules on mobile computing security and vulnerability discovery, will be disseminated through a dedicated web site. Collaborations with the industry will be sought to transfer the technology to interested software companies and government entities that perform insecurity analysis of MoMP.The project will develop new architectural designs, algorithms and techniques for precise and automated insecurity analysis of MoMP. To make the research concrete, demonstrations will be created for the Android Framework for mobile smartphones, tablets and IoT devices, and the first platform for precise and automated insecurity analysis of Android Framework will be built, combining current software analysis techniques, such as symbolic execution, hybrid dynamic/static analysis, and cross-process and cross-layer software analysis, to make them capable of analyzing complex and large-sized MoMP like Android Framework. The platform will be evaluated and applied to discovering various types of zero-day vulnerabilities and generating proof-of-concept exploits.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
近十年来,移动平台上的中间件(如Android中的Application Framework、iOS中的Core Services层)蓬勃发展,但对此类中间件的不安全性分析却相对滞后。例如,虽然对Android系统的应用层进行了全面的研究,但对Android系统中间件层Android应用程序框架(简称Android Framework)的分析工作却非常有限。二十亿个Android移动设备和众多的Android Things设备都依赖于Android Framework提供的系统服务。近期,Android Framework的多个漏洞被曝光,表明Android Framework存在脆弱性和可利用性。鉴于Android框架的关键作用,框架中的漏洞可能被利用来发起大规模网络攻击,对用户安全和隐私造成严重危害。然而,Android Framework的不安全分析相当临时、不精确,并且需要大量的人工工作,这主要是因为移动平台上此类中间件(MoMP)的不安全分析技术和工具严重缺乏。该研究项目旨在通过开发用于 Android 框架等 MoMP 不安全分析的新技术和工具来填补这一空白,从而为大量智能手机和物联网 (IoT) 设备用户带来更安全、更值得信赖的计算环境。该项目开发的教育资源,包括移动计算安全和漏洞发现的课程模块,将通过专门的网站传播。将寻求与业界的合作,将该技术转让给对 MoMP 进行不安全分析的感兴趣的软件公司和政府实体。该项目将开发新的架构设计、算法和技术,以对 MoMP 进行精确和自动化的不安全分析。为了使研究具体化,将为移动智能手机、平板电脑和物联网设备的Android框架创建演示,并将结合当前的软件分析技术(例如符号执行),构建第一个对Android框架进行精确和自动化不安全分析的平台、混合动态/静态分析以及跨进程和跨层软件分析,使它们能够像Android Framework一样分析复杂和大型的MoMP。该平台将被评估并应用于发现各种类型的零日漏洞并生成概念验证漏洞。该奖项反映了 NSF 的法定使命,并通过使用基金会的智力价值和更广泛的影响审查标准进行评估,被认为值得支持。
项目成果
期刊论文数量(22)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Identifying Channel Related Vulnerabilities in Zephyr Firmware
识别 Zephyr 固件中与通道相关的漏洞
- DOI:10.1109/ithings-greencom-cpscom-smartdata-cybermatics55523.2022.00055
- 发表时间:2022-08-01
- 期刊:
- 影响因子:0
- 作者:Devansh Rajgarhia;Peng Liu;S. Sural
- 通讯作者:S. Sural
Using deep learning to solve computer security challenges: a survey
使用深度学习解决计算机安全挑战:一项调查
- DOI:10.1186/s42400-020-00055-5
- 发表时间:2019-12-12
- 期刊:
- 影响因子:3.1
- 作者:Yoon;Peng Liu;Zitong Shang;Haizhou Wang;Zhilong Wang;Lan Zhang;Junwei Zhou;Qingtian Zou
- 通讯作者:Qingtian Zou
Protecting mobile devices from physical memory attacks with targeted encryption
通过有针对性的加密保护移动设备免受物理内存攻击
- DOI:10.1145/3317549.3319721
- 发表时间:2019-05-15
- 期刊:
- 影响因子:0
- 作者:Le Guan;Chen Cao;Sencun Zhu;Jingqiang Lin;Peng Liu;Yubin Xia;Bo Luo
- 通讯作者:Bo Luo
Towards Large-Scale Hunting for Android Negative-Day Malware
大规模追捕 Android 负日恶意软件
- DOI:
- 发表时间:2019-01
- 期刊:
- 影响因子:0
- 作者:Yuan, Lun;Hu, Wenjun;Yu, Ting;Liu, Peng;Zhu, Sencun
- 通讯作者:Zhu, Sencun
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation
与设备无关的固件执行是可能的:用于外设仿真的 Concolic 执行方法
- DOI:10.1145/3427228.3427280
- 发表时间:2020-12-07
- 期刊:
- 影响因子:0
- 作者:Chen Cao;Le Guan;Jiang Ming;Peng Liu
- 通讯作者:Peng Liu
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Peng Liu其他文献
Early energy performance analysis of smart buildings by consolidated artificial neural network paradigms
通过综合人工神经网络范式对智能建筑进行早期能源性能分析
- DOI:
10.1016/j.heliyon.2024.e25848 - 发表时间:
2024-02-01 - 期刊:
- 影响因子:4
- 作者:
Guoqing Guo;Peng Liu;Yuchen Zheng - 通讯作者:
Yuchen Zheng
Genetic confirmation for a central role for TNFα in the direct action of thyroid stimulating hormone on the skeleton
基因证实 TNFα 在促甲状腺激素对骨骼的直接作用中起核心作用
- DOI:
- 发表时间:
2013 - 期刊:
- 影响因子:11.1
- 作者:
Li Sun;Ling;P. Lu;T. Yuen;Jianhua Li;Risheng Ma;R. Baliram;Surinder S. Moonga;Peng Liu;A. Zallone;M. New;T. Davies;M. Zaidi - 通讯作者:
M. Zaidi
A pathogenic bacteria, Spiroplasma eriocheiris, is driven by the internal structure including four bacterial actins
病原菌,螺旋原体,由包括四种细菌肌动蛋白的内部结构驱动
- DOI:
- 发表时间:
2018 - 期刊:
- 影响因子:0
- 作者:
Peng Liu; Masaki Mizutani; Hirofumi Wada; Bertin Clothilde; Makoto Miyata - 通讯作者:
Makoto Miyata
Formation and analysis of amorphous and nanocrystalline phases in Al–Cu–Mg alloy under friction stir processing
Al-Cu-Mg合金搅拌摩擦加工非晶相和纳米晶相的形成与分析
- DOI:
10.1080/09500839.2015.1050475 - 发表时间:
2015-06-03 - 期刊:
- 影响因子:1.2
- 作者:
Peng Liu;Q. Shi - 通讯作者:
Q. Shi
Transcriptome Analysis of Avian Pathogenic Escherichia coli O1 in Chicken Serum Reveals Adaptive Responses to Systemic Infection
鸡血清中禽致病性大肠杆菌 O1 的转录组分析揭示了对全身感染的适应性反应
- DOI:
10.1128/iai.01230-10 - 发表时间:
2011-02-28 - 期刊:
- 影响因子:3.1
- 作者:
Ganwu Li;K. A. Tivendale;Peng Liu;Yaping Feng;Y. Wannemuehler;Wentong Cai;Paul Mangiamele;T. Johnson;C. Constantinidou;C. Penn;L. Nolan - 通讯作者:
L. Nolan
Peng Liu的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Peng Liu', 18)}}的其他基金
Computational Studies of Selective C-H Functionalization Reactions
选择性 C-H 官能化反应的计算研究
- 批准号:
2247505 - 财政年份:2023
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
Frontera Travel Grant: Computational Studies of Transition Metal-Catalyzed Reactions
Frontera 旅行补助金:过渡金属催化反应的计算研究
- 批准号:
2031953 - 财政年份:2020
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
Collaborative Research: SaTC: CORE: Medium: Cyber-threat Detection and Diagnosis in Multistage Manufacturing Systems through Cyber and Physical Data Analytics
协作研究:SaTC:核心:中:通过网络和物理数据分析进行多级制造系统中的网络威胁检测和诊断
- 批准号:
2019340 - 财政年份:2020
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
CAREER: Computational Studies of Transition Metal Catalyzed Reactions in Organic Synthesis
职业:有机合成中过渡金属催化反应的计算研究
- 批准号:
1654122 - 财政年份:2017
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
TWC: Small: Collaborative: Towards Agile and Privacy-Preserving Cloud Computing
TWC:小型:协作:迈向敏捷和隐私保护的云计算
- 批准号:
1422594 - 财政年份:2014
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
CAREER: Examining Users' Collective Privacy Management for Online Social Networks
职业:检查在线社交网络用户的集体隐私管理
- 批准号:
0953749 - 财政年份:2010
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
NeTS: Small: Collaborative Research:Secure and Resilient Channel Allocation in Multi-Radio Wireless Networks
NeTS:小型:协作研究:多无线电无线网络中的安全和弹性信道分配
- 批准号:
0916469 - 财政年份:2009
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
TC: Medium: Collaborative Research: Towards Self-Protecting Data Centers: A Systematic Approach
TC:媒介:协作研究:迈向自我保护数据中心:系统方法
- 批准号:
0905131 - 财政年份:2009
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
Collaborative Research: CT-T: Transparent Damage Quarantine and Recovery in Transactional Applications and Web Services
合作研究:CT-T:事务应用程序和 Web 服务中的透明损坏隔离和恢复
- 批准号:
0716479 - 财政年份:2007
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
Capacity Building in Information Assurance at Penn State University
宾夕法尼亚州立大学信息保障能力建设
- 批准号:
0416827 - 财政年份:2004
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
相似国自然基金
基于NRF2调控KPNB1促进PD-L1核转位介导非小细胞肺癌免疫治疗耐药的机制研究
- 批准号:82303969
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
polyG蛋白聚集体诱导小胶质细胞活化在神经元核内包涵体病中的作用及机制研究
- 批准号:82301603
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
前丘脑室旁核小胶质细胞经由TNF-α参与强迫进食行为的作用及机制研究
- 批准号:82301521
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
小胶质细胞调控外侧隔核-腹侧被盖区神经环路介导社交奖赏障碍的机制研究
- 批准号:82304474
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
空间邻近标记技术研究莱茵衣藻蛋白核小管与碳浓缩机制的潜在关系
- 批准号:32300220
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
相似海外基金
SaTC: CORE: Small: An evaluation framework and methodology to streamline Hardware Performance Counters as the next-generation malware detection system
SaTC:核心:小型:简化硬件性能计数器作为下一代恶意软件检测系统的评估框架和方法
- 批准号:
2327427 - 财政年份:2024
- 资助金额:
$ 16.55万 - 项目类别:
Continuing Grant
NSF-NSERC: SaTC: CORE: Small: Managing Risks of AI-generated Code in the Software Supply Chain
NSF-NSERC:SaTC:核心:小型:管理软件供应链中人工智能生成代码的风险
- 批准号:
2341206 - 财政年份:2024
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
- 批准号:
2338302 - 财政年份:2024
- 资助金额:
$ 16.55万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Small: Towards Secure and Trustworthy Tree Models
协作研究:SaTC:核心:小型:迈向安全可信的树模型
- 批准号:
2413046 - 财政年份:2024
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant
SaTC: CORE: Small: NSF-DST: Understanding Network Structure and Communication for Supporting Information Authenticity
SaTC:核心:小型:NSF-DST:了解支持信息真实性的网络结构和通信
- 批准号:
2343387 - 财政年份:2024
- 资助金额:
$ 16.55万 - 项目类别:
Standard Grant