ENTRUST: Regulating Sensor Access by Cooperating Programs via Delegation Graphs Giuseppe Petracca, Pennsylvania State University, US; Yuqiong Sun, Symantec Research Labs, US; Ahmad-Atamli Reineh, Alan Turing Institute, UK; Patrick McDaniel, Pennsylvania State University, US; Jens Grossklags, Technical University of Munich, DE; Trent Jaeger, Pennsylvania State University, US https://www.usenix.org/conference/usenixsecurity19/presentation/petracca This paper is included in the Proceedings of the 28th USENIX Security Symposium. August 14–16, 2019 • Santa Clara, CA, USA 978-1-939133-06-9 Open access to the Proceedings of the 28th USENIX Security Symposium is sponsored by USENIX. EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs Giuseppe Petracca Yuqiong Sun Ahmad-Atamli Reineh Penn State University, US Symantec Research Labs, US Alan Turing Institute, UK
[email protected] [email protected] [email protected] Patrick McDaniel Jens Grossklags Trent Jaeger Penn State University, US Technical University of Munich, DE Penn State University, US
[email protected] [email protected] [email protected] Abstract For instance, modern operating systems now ship with Modern operating systems support a cooperating pro- voice-controlled personal assistants that may enlist apps gram abstraction that, instead of placing all function- and other system services to fulfill user requests, reach- ality into a single program, allows diverse programs to ing for a new horizon in human-computer interaction. cooperate to complete tasks requested by users. How- Unfortunately, system services are valuable targets ever, untrusted programs may exploit such interactions for adversaries because they often have more permis- to spy on users through device sensors by causing priv- sions than normal apps.