In year 1, we will develop defense mechanisms on app instrumentation. In year 2, we will extend the trust model to take into account of all the components outside the phone and leverage such trust model to characterize and identify attacks of ad network violations. In year 3, we will leverage the previous trust model to study the attacks against market trust violations. Furthermore, work together with UCSB teams, we will jointly perform the following tasks: 1) Perform large-scale assessment of the presence of trust-based weaknesses in existing benign applications; 2) Perform large-scale search for malicious apps that exploit trust weaknesses; 3) Integrate the defense building blocks for a coherent system and conduct comprehensive evaluations.
|Effective start/end date||10/1/14 → 9/30/18|
- National Science Foundation (CNS-1408790)