Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael C. Grace is active.

Publication


Featured researches published by Michael C. Grace.


international conference on mobile systems, applications, and services | 2012

RiskRanker: scalable and accurate zero-day android malware detection

Michael C. Grace; Yajin Zhou; Qiang Zhang; Shihong Zou; Xuxian Jiang

Smartphone sales have recently experienced explosive growth. Their popularity also encourages malware authors to penetrate various mobile marketplaces with malicious applications (or apps). These malicious apps hide in the sheer number of other normal apps, which makes their detection challenging. Existing mobile anti-virus software are inadequate in their reactive nature by relying on known malware samples for signature extraction. In this paper, we propose a proactive scheme to spot zero-day Android malware. Without relying on malware samples and their signatures, our scheme is motivated to assess potential security risks posed by these untrusted apps. Specifically, we have developed an automated system called RiskRanker to scalably analyze whether a particular app exhibits dangerous behavior (e.g., launching a root exploit or sending background SMS messages). The output is then used to produce a prioritized list of reduced apps that merit further investigation. When applied to examine 118,318 total apps collected from various Android markets over September and October 2011, our system takes less than four days to process all of them and effectively reports 3281 risky apps. Among these reported apps, we successfully uncovered 718 malware samples (in 29 families) and 322 of them are zero-day (in 11 families). These results demonstrate the efficacy and scalability of RiskRanker to police Android markets of all stripes.


computer and communications security | 2013

The impact of vendor customizations on android security

Lei Wu; Michael C. Grace; Yajin Zhou; Chiachih Wu; Xuxian Jiang

The smartphone market has grown explosively in recent years, as more and more consumers are attracted to the sensor-studded multipurpose devices. Android is particularly ascendant; as an open platform, smartphone manufacturers are free to extend and modify it, allowing them to differentiate themselves from their competitors. However, vendor customizations will inherently impact overall Android security and such impact is still largely unknown. In this paper, we analyze ten representative stock Android images from five popular smartphone vendors (with two models from each vendor). Our goal is to assess the extent of security issues that may be introduced from vendor customizations and further determine how the situation is evolving over time. In particular, we take a three-stage process: First, given a smartphones stock image, we perform provenance analysis to classify each app in the image into three categories: apps originating from the AOSP, apps customized or written by the vendor, and third-party apps that are simply bundled into the stock image. Such provenance analysis allows for proper attribution of detected security issues in the examined Android images. Second, we analyze permission usages of pre-loaded apps to identify overprivileged ones that unnecessarily request more Android permissions than they actually use. Finally, in vulnerability analysis, we detect buggy pre-loaded apps that can be exploited to mount permission re-delegation attacks or leak private information. Our evaluation results are worrisome: vendor customizations are significant on stock Android devices and on the whole responsible for the bulk of the security problems we detected in each device. Specifically, our results show that on average 85.78% of all pre-loaded apps in examined stock images are overprivileged with a majority of them directly from vendor customizations. In addition, 64.71% to 85.00% of vulnerabilities we detected in examined images from every vendor (except for Sony) arose from vendor customizations. In general, this pattern held over time -- newer smartphones, we found, are not necessarily more secure than older ones.


european symposium on research in computer security | 2009

ReFormat: automatic reverse engineering of encrypted messages

Zhi Wang; Xuxian Jiang; Weidong Cui; Xinyuan Wang; Michael C. Grace

Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in analyzing only plaintext communications wherein the exchanged messages are not encrypted. In this paper, we propose ReFormat, a system that aims at deriving the message format even when the message is encrypted. Our approach is based on the observation that an encrypted input message will typically go through two phases: message decryption and normal protocol processing. These two phases can be differentiated because the corresponding instructions are significantly different. Further, with the help of data lifetime analysis of run-time buffers, we can pinpoint the memory locations that contain the decrypted message generated from the first phase and are later accessed in the second phase. We have developed a prototype and evaluated it with several real-world protocols. Our experiments show that ReFormat can accurately identify decrypted message buffers and then reveal the associated message structure.


european conference on computer systems | 2012

Isolating commodity hosted hypervisors with HyperLock

Zhi Wang; Chiachih Wu; Michael C. Grace; Xuxian Jiang

Hosted hypervisors (e.g., KVM) are being widely deployed. One key reason is that they can effectively take advantage of the mature features and broad user bases of commodity operating systems. However, they are not immune to exploitable software bugs. Particularly, due to the close integration with the host and the unique presence underneath guest virtual machines, a hosted hypervisor -- if compromised -- can also jeopardize the host system and completely take over all guests in the same physical machine. In this paper, we present HyperLock, a systematic approach to strictly isolate privileged, but potentially vulnerable, hosted hypervisors from compromising the host OSs. Specifically, we provide a secure hypervisor isolation runtime with its own separated address space and a restricted instruction set for safe execution. In addition, we propose another technique, i.e., hypervisor shadowing, to efficiently create a separate shadow hypervisor and pair it with each guest so that a compromised hypervisor can affect only the paired guest, not others. We have built a proof-of-concept HyperLock prototype to confine the popular KVM hypervisor on Linux. Our results show that HyperLock has a much smaller (12%) trusted computing base (TCB) than the original KVM. Moreover, our system completely removes QEMU, the companion user program of KVM (with >531K SLOC), from the TCB. The security experiments and performance measurements also demonstrated the practicality and effectiveness of our approach.


international conference on security and privacy in communication systems | 2010

Transparent Protection of Commodity OS Kernels Using Hardware Virtualization

Michael C. Grace; Zhi Wang; Deepa Srinivasan; Jinku Li; Xuxian Jiang; Zhenkai Liang; Siarhei Liakh

Kernel rootkits are among the most insidious threats to computer security today. By employing various code injection techniques, they are able to maintain an omnipotent presence in the compromised OS kernels. Existing preventive countermeasures typically employ virtualization technology as part of their solutions. However, they are still limited in either (1) requiring modifying the OS kernel source code for the protection or (2) leveraging software-based virtualization techniques such as binary translation with a high overhead to implement a Harvard architecture (which is robust to various code injection techniques used by kernel rootkits). In this paper, we introduce hvmHarvard, a hardware virtualization-based Harvard architecture that transparently protects commodity OS kernels from kernel rootkit attacks and significantly reduces the performance overhead. Our evaluation with a Xen-based prototype shows that it can transparently protect legacy OS kernels with rootkit resistance while introducing < 5% performance overhead.


annual computer security applications conference | 2010

Analyzing and improving Linux kernel memory protection: a model checking approach

Siarhei Liakh; Michael C. Grace; Xuxian Jiang

Code injection continues to pose a serious threat to computer systems. Among existing solutions, W ⊕ X is a notable approach to prevent the execution of injected code. In this paper, we focus on the Linux kernel memory protection and systematically check for possible W ⊕ X violations in the Linux kernel design and implementation. In particular, we have developed a Murphi-based abstract model and used it to discover several serious shortcomings in the current Linux kernel that violate the W ⊕ X property. We have confirmed with the Linux community the presence of these problems and accordingly developed five Linux kernel patches. (Four of them are in the process of being integrated into the mainline Linux kernel.) Our evaluation with these patches indicate that they involve only minimal changes to the existing code base and incur negligible performance overhead.


technical symposium on computer science education | 2007

ProofChecker: an accessible environment for automata theory correctness proofs

Matthias F. M. Stallmann; Suzanne Balik; Robert D. Rodman; Sina Bahram; Michael C. Grace; Susan D. High

ProofChecker is a graphical program based on the notion of formal correctness proofs that allows students, both sighted and visually impaired, to draw a deterministic finite automaton (DFA) and determine whether or not it correctly recognizes a given language. Sighted students use the mouse and graphical controls to draw and manipulate the DFA. Keyboard shortcuts, together with the use of a screen reader to voice the accessible descriptions provided by the program, allow visually impaired students to do the same. Because the states of a DFA partition thelanguage over its alphabet into equivalence classes, each state has a language associated with it. Conditions that describe the language of each state are entered by the student in the form of conditional expressions with function calls and/or regular expressions. A brute-force approach is then used to check that each states condition correctly describes all of the strings in its language and that none of the strings in a states language meet the condition for another state. Feedback is provided that either confirms that the DFA correctly meets thegiven conditions or alerts the student to a mismatch between the conditions and the DFA. A students DFA can be saved in an XML file and submitted for grading. An automated checking tool, known as ProofGrader, can be used to compare a students DFA with the correct DFA for a given language, thus greatly speeding up the grading of student assignments.


network and distributed system security symposium | 2012

Systematic Detection of Capability Leaks in Stock Android Smartphones.

Michael C. Grace; Yajin Zhou; Zhi Wang; Xuxian Jiang


wireless network security | 2012

Unsafe exposure analysis of mobile in-app advertisements

Michael C. Grace; Wu Zhou; Xuxian Jiang; Ahmad-Reza Sadeghi


conference on data and application security and privacy | 2013

Fast, scalable detection of "Piggybacked" mobile applications

Wu Zhou; Yajin Zhou; Michael C. Grace; Xuxian Jiang; Shihong Zou

Collaboration


Dive into the Michael C. Grace's collaboration.

Top Co-Authors

Avatar

Xuxian Jiang

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Zhi Wang

Florida State University

View shared research outputs
Top Co-Authors

Avatar

Yajin Zhou

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Jinku Li

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Deepa Srinivasan

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Sina Bahram

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Chiachih Wu

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Siarhei Liakh

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Wu Zhou

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Shihong Zou

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge