UiRef: Analysis of Sensitive User Inputs in Android Applications

被引:22
作者
Andow, Benjamin [1 ]
Acharya, Akhil [1 ]
Li, Dengfeng [2 ]
Enck, William [1 ]
Singh, Kapil [3 ]
Xie, Tao [2 ]
机构
[1] North Carolina State Univ, Raleigh, NC 27695 USA
[2] Univ Illinois, Champaign, IL USA
[3] IBM TJ Watson Res Ctr, Ossining, NY USA
来源
PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017) | 2017年
基金
美国国家科学基金会;
关键词
D O I
10.1145/3098243.3098247
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile applications frequently request sensitive data. While prior work has focused on analyzing sensitive-data uses originating from well-defined API calls in the system, the security and privacy implications of inputs requested via application user interfaces have been widely unexplored. In this paper, our goal is to understand the broad implications of such requests in terms of the type of sensitive data being requested by applications. To this end, we propose UiRef (User Input REsolution Framework), an automated approach for resolving the semantics of user inputs requested by mobile applications. UiRef's design includes a number of novel techniques for extracting and resolving user interface labels and addressing ambiguity in semantics, resulting in significant improvements over prior work. We apply UiRef to 50,162 Android applications from Google Play and use outlier analysis to triage applications with questionable input requests. We identify concerning developer practices, including insecure exposure of account passwords and non-consensual input disclosures to third parties. These findings demonstrate the importance of user-input semantics when protecting end users.
引用
收藏
页码:23 / 34
页数:12
相关论文
共 33 条
  • [11] Egele M., 2011, NDSS, P177
  • [12] Enck William, 2010, P USENIX S OP SYST D
  • [13] Fritz Christian, 2014, P ACM SIGPLAN C PROG
  • [14] Gibler Clint, 2012, P INT C TRUST TRUST
  • [15] Information-Flow Analysis of Android Applications in DroidSafe
    Gordon, Michael, I
    Kim, Deokhwan
    Perkins, Jeff
    Gilham, Limei
    Nguyen Nguyen
    Rinard, Martin
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [16] Checking App Behavior Against App Descriptions
    Gorla, Alessandra
    Tavecchia, Ilaria
    Gross, Florian
    Zeller, Andreas
    [J]. 36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 1025 - 1035
  • [17] Han Jin, 2013, P ISOC NETW DISTR SY P ISOC NETW DISTR SY
  • [18] Huang JJ, 2014, PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING - 2014, VOL 2B
  • [19] Huang Jianjun, 2015, P USENIX SEC S
  • [20] Lesk Michael, 1986, P INT C SYST DOC