Certificate Reuse in Android Applications

被引:1
作者
Nezhadian, Fatemeh [1 ]
Branca, Enrico [1 ]
Stakhanova, Natalia [1 ]
机构
[1] Univ Saskatchewan, Saskatoon, SK, Canada
来源
INFORMATION SECURITY, ISC 2023 | 2023年 / 14411卷
关键词
Cryptography; Android; Malware; Digital Certificates;
D O I
10.1007/978-3-031-49187-0_12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The widespread adoption of Android apps has led to increasing concerns about the concept of '' recycled trust '' derived from the reuse of digital certificates. Android app developers frequently depend on digital certificates to sign their applications, and users place their trust in an app when they recognize the owner provided by the same certificate. Although the presence of cryptographic misuse has been acknowledged by several studies, its extent and characteristics are not well understood. In this work, we perform a large-scale analysis of certificate reuse across the Android ecosystem and malware binaries on a collection of over 19 million certificates and over 9 million keys extracted from PE files and Android applications collected over several years. Our results reveal that despite the growing nature of the Android ecosystem, the misuse of cryptographic elements is common and persistent. Our findings uncover several issues and enable us to provide a series of applicable solutions to the seen security flaws.
引用
收藏
页码:226 / 245
页数:20
相关论文
共 18 条
[1]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[2]  
Barker Elaine., 2019, Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography
[3]  
Cooper Dave., 2008, INTERNET X 509 PUBLI, DOI DOI 10.17487/RFC5280
[4]  
Egele Manuel., 2013, P 2013 ACM SIGSAC C, P73, DOI DOI 10.1145/2508859.2516693
[5]   Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers [J].
Fahl, Sascha ;
Dechand, Serge ;
Perl, Henning ;
Fischer, Felix ;
Smrcek, Jaromir ;
Smith, Matthew .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1143-1155
[6]  
Falliere N., 2010, Stuxnet Dossier
[7]  
Jun Gao, 2019, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), P388, DOI 10.1109/MSR.2019.00065
[8]  
Kang H., 2014, AndroTracker: creator information based Android malware classification system
[9]   Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI [J].
Kim, Doowon ;
Kwon, Bum Jun ;
Dumitras, Tudor .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1435-1448
[10]   K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces [J].
Li, Juanru ;
Lin, Zhiqiang ;
Caballero, Juan ;
Zhang, Yuanyuan ;
Gu, Dawu .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :412-425