Android inter-app communication threats and detection techniques

被引:25
作者
Bhandari, Shweta [1 ]
Ben Jaballah, Wafa [2 ]
Jain, Vineeta [1 ]
Laxmi, Vijay [1 ]
Zemmari, Akka [3 ]
Gaur, Manoj Singh [4 ]
Mosbah, Mohamed [3 ]
Conti, Mauro [5 ]
机构
[1] Malaviya Natl Inst Technol Jaipur MNIT Jaipur, Jaipur, Rajasthan, India
[2] Thales Grp, Paris, France
[3] Univ Bordeaux, LaBRI, CNRS, F-33405 Talence, France
[4] Indian Inst Technol, Jammu, J&K, India
[5] Univ Padua, Padua, Italy
关键词
App collusion; Privacy leakage; Inter component communication; Inter-app communication; Multi-app analysis; MALWARE;
D O I
10.1016/j.cose.2017.07.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the digital breakthrough, smart phones have become very essential component for many routine tasks like shopping, paying bills, transferring money, instant messaging, emails etc. Mobile devices are very attractive attack surface for cyber thieves as they hold personal details (accounts, locations, contacts, photos) and have potential capabilities for eavesdropping (with cameras/microphone, wireless connections). Android, being the most popular, is the target of malicious hackers who are trying to use Android app as a tool to break into and control device. Android malware authors use many anti-analysis techniques to hide from analysis tools. Academic researchers and commercial anti-malware companies are putting great effort to detect such malicious apps. They are making use of the combinations of static, dynamic and behavior-based analysis techniques. Despite of all the security mechanisms provided by Android, apps can carry out malicious actions through inter-app communication. One such inter-app communication threats is collusion. In collusion, malicious functionality is divided across multiple apps. Each participating app accomplishes its part and communicate information to another app through Inter Component Communication (ICC). ICC does not require any special permissions. Also there is no compulsion to inform user about the communication. Each participating app needs to request a minimal set of privileges, which may make it appear benign to current state-of-the-art techniques that analyze one app at a time. There are many surveys on app analysis techniques in Android; however they focus on single-app analysis. This survey highlights several inter-app communication threats, in particular collusion among multiple-apps. In this paper, we present Android vulnerabilities that may be exploited for carrying privilege escalation attacks, privacy leakage and collusion attacks. We cover the existing threat analysis, scenarios, and a detailed comparison of tools for intraand inter-app analysis. To the best of our knowledge this is the first survey on inter-app communication threats, app collusion and state-of-the-art detection tools in Android. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:392 / 421
页数:30
相关论文
共 99 条
[1]  
Amalfitano D., 2011, 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), P252, DOI 10.1109/ICSTW.2011.77
[2]  
[Anonymous], 2013, Proceedings of the 22Nd USENIX Conference on Security, SEC'13
[3]  
[Anonymous], 2011, The Soot framework for Java program analysis: a retrospective
[4]  
[Anonymous], 2011, USENIX SEC S
[5]  
[Anonymous], 2012, WORKSH MOB SEC TECHN
[6]  
[Anonymous], 2014, NDSS
[7]  
[Anonymous], 2012, Proceedings of the 19th ACM Conference on Computer and Communications Security, DOI DOI 10.1145/2382196.2382223
[8]  
[Anonymous], 2016, P ANN S NETW DISTR S
[9]  
[Anonymous], 1994, Program analysis and specialization for the C programming language
[10]  
[Anonymous], 2015, NDSS