Duraisamy Soundrapandian, Pradeep KumarBao, TiffanyBaek, JaejongShoshitaishvili, YanDoupé, AdamWang, RuoyuAhn, Gail-Joon2020-12-242020-12-242021-01-05978-0-9981331-4-0http://hdl.handle.net/10125/71490Intents are the plain-text based message object used for ICC by the Android framework. Hence the framework essentially lacks an inbuilt security mechanism to protect the visibility, accessibility, and integrity of Intent's data that facilitates adversaries to intercept or manipulate the data. In this work, we investigate the Intent protection mechanism and propose a security-enhanced Intent library MuTent that allows Android apps to securely exchange sensitive data during ICC. Differently from the existing mechanism, MuTent provides accessibility and visibility of Intent data by validating the receiver's capability and provides integrity by using encryption and the Arc security contract code. Especially, ICC is initiated by exchanging MuTent and follows a novel ownership-based key distribution model, that restricts the malware apps without permission from deciphering data. Through the evaluation, we show that MuTent can improve the security for popular Android apps with minimal performance overheads, demonstrated using F-Droid apps.10 pagesEnglishAttribution-NonCommercial-NoDerivatives 4.0 InternationalSoftware Development for Mobile Devices, the Internet-of-Things, and Cyber-Physical Systemsencryptionintent leakmutation attackownership-based key generation and distributionownership typessecurity contractsMuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts10.24251/HICSS.2021.869