Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications

被引:81
作者
Bosu, Amiangshu [1 ]
Liu, Fang [2 ]
Yao, Danfeng [2 ]
Wang, Gang [2 ]
机构
[1] Southern Illinois Univ, Dept Comp Sci, Carbondale, IL 62901 USA
[2] Virginia Tech, Dept Comp Sci, Blacksburg, VA USA
来源
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17) | 2017年
关键词
Android; Security; Collusion; Inter-component communication; Inter-app communication; Privilege escalation; Intent;
D O I
10.1145/3052973.3053004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Inter-Component Communication (ICC) provides a message passing mechanism for data exchange between Android applications. It has been long believed that inter-app ICCs can be abused by malware writers to launch collusion attacks using two or more apps. However, because of the complexity of performing pairwise program analysis on apps, the scale of existing analyses is too small (e.g., up to several hundred) to produce concrete security evidence. In this paper, we report our findings in the first large-scale detection of collusive and vulnerable apps, based on inter-app ICC data flows among 110,150 real-world apps. Our system design aims to balance the accuracy of static ICC resolution/data-flow analysis and run-time scalability. This large-scale analysis provides real-world evidence and deep insights on various types of inter-app ICC abuse. Besides the empirical findings, we make several technical contributions, including a new open source ICC resolution tool with improved accuracy over the state-of-the-art, and a large database of inter-app ICCs and their attributes.
引用
收藏
页码:71 / 85
页数:15
相关论文
共 41 条
  • [1] Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
  • [2] [Anonymous], 2013, Proceedings of the 22Nd USENIX Conference on Security, SEC'13
  • [3] [Anonymous], 2013, ACM INT C PROCEEDING
  • [4] [Anonymous], 2013, P 22 USENIX SEC S US
  • [5] [Anonymous], 2011, TR201104 TU DARMST
  • [6] [Anonymous], 2014, P NETW DISTR SYST SE
  • [7] [Anonymous], 2012, Proceedings of the 19th ACM Conference on Computer and Communications Security, DOI DOI 10.1145/2382196.2382223
  • [8] [Anonymous], 2014, P NETW DISTR SYST SE
  • [9] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
  • [10] COVERT: Compositional Analysis of Android Inter-App Permission Leakage
    Bagheri, Hamid
    Sadeghi, Alireza
    Garcia, Joshua
    Malek, Sam
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2015, 41 (09) : 866 - 886