Prevention of Cross-update Privacy Leaks on Android

被引:3
作者
Cho, Beumjin [1 ]
Lee, Sangho [2 ]
Xu, Meng [2 ]
Ji, Sangwoo [1 ]
Kim, Taesoo [2 ]
Kim, Jong [1 ]
机构
[1] Pohang Univ Sci & Technol POSTECH, Dept Comp Sci & Engn, Pohang, South Korea
[2] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
关键词
Android; Privacy; Information flow; Permission;
D O I
10.2298/CSIS170728047C
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Updating applications is an important mechanism to enhance their availability, functionality, and security. However, without careful considerations, application updates can bring other security problems. In this paper, we consider a novel attack that exploits application updates on Android: a cross-update privacy-leak attack called COUPLE. The COUPLE attack allows an application to secretly leak sensitive data through the cross-update interaction between its old and new versions; each version only has permissions and logic for either data collection or transmission to evade detection. We implement a runtime security system, BREAKUP, that prevents cross-update sensitive data transactions by tracking permission-use histories of individual applications. Evaluation results show that BREAKUP's time overhead is below 5%. We further show the feasibility of the COUPLE attack by analyzing the versions of 2,009 applications (28,682 APKs).
引用
收藏
页码:111 / 137
页数:27
相关论文
共 57 条
  • [1] DroidNative: Automating and optimizing detection of Android native code malware variants
    Alam, Shahid
    Qu, Zhengyang
    Riley, Ryan
    Chen, Yan
    Rastogi, Vaibhav
    [J]. COMPUTERS & SECURITY, 2017, 65 : 230 - 246
  • [2] Almohri H. M. J., 2014, C DAT APPL SEC PRIV
  • [3] Android Developers, REQ PERM RUN TIM
  • [4] Android googlesource, PACK
  • [5] [Anonymous], 2012, P 8 S US PRIV SEC SO
  • [6] [Anonymous], 2014, ACM SIGPLAN C PROGR
  • [7] [Anonymous], 2011, USENIX SEC S
  • [8] [Anonymous], 2011, 9 INT C MOB SYST APP
  • [9] [Anonymous], USENIX SEC S
  • [10] [Anonymous], NETW DISTR SYST SEC