Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers

被引:14
作者
Fahl, Sascha [1 ]
Dechand, Serge [2 ]
Perl, Henning [1 ]
Fischer, Felix [3 ]
Smrcek, Jaromir [4 ]
Smith, Matthew [2 ]
机构
[1] Fraunhofer, FKIE, USECAP, Bonn, Germany
[2] Univ Bonn, USECAP, Bonn, Germany
[3] Leibniz Univ Hannover, USECAP, Hannover, Germany
[4] Zoner Inc, San Francisco, CA USA
来源
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2014年
关键词
Android; Apps; Signing; Application Transparency;
D O I
10.1145/2660267.2660311
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile devices are evolving as the dominant computing platform and consequently application repositories and app markets are becoming the prevalent paradigm for deploying software. Due to their central and trusted position in the software ecosystem, coerced, hacked or malicious app markets pose a serious threat to user security. Currently, there is little that hinders a nation state adversary (NSA) or other powerful attackers from using such central and trusted points of software distribution to deploy customized (malicious) versions of apps to specific users. Due to intransparencies in the current app installation paradigm, this kind of attack is extremely hard to detect. In this paper, we evaluate the risks and drawbacks of current app deployment in the face of powerful attackers. We assess the app signing practices of 97% of all free Google Play apps and find that the current practices make targeted attacks unnecessarily easy and almost impossible to detect for users and app developers alike. We show that high profile Android apps employ intransparent and unaccountable strategies when they publish apps to (multiple) alternative markets. We then present and evaluate Application Transparency (AT), a new framework that can defend against "targeted-and-stealthy" attacks, mount by malicious markets. We deployed AT in the wild and conducted an extensive field study in which we analyzed app installations on 253,819 real world Android devices that participate in a popular anti-virus app's telemetry program. We find that AT can effectively protect users against malicious targeted attack apps and furthermore adds transparency and accountability to the current intransparent signing and packaging strategies employed by many app developers.
引用
收藏
页码:1143 / 1155
页数:13
相关论文
共 23 条
[1]  
[Anonymous], 2011, SOVEREIGN KEY CRYPTO
[2]  
[Anonymous], 2013, 6962 RFC
[3]  
Barrera D., SPSM 12
[4]  
BlackHat B., 2014, ANDROID MASTER KEY B
[5]  
Chia P. H., WWW 12
[6]  
dHeureuse N., 2012, SIGMOBILE MOB COMPUT
[7]  
Felt A. P., SOUPS 12
[8]  
Felt Adrienne Porter, CCS 11
[9]  
Gibler C., MOBISYS 13
[10]  
Grace M., MOBISYS 12