SurgeScan: Enforcing Security Policies on Untrusted Third-Party Android Libraries

被引:0
|
作者
Vronsky, Jonathan [1 ]
Stevens, Ryan [1 ]
Chen, Hao [1 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
来源
2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI) | 2017年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many Android apps include third-party libraries for advertising, payment, social media, etc. However, since the library code runs with the same privilege as the app code, the app developer has to either trust the library, a potential security risk, or refrain from using untrusted libraries. We designed and implemented SURGESCAN, a framework for specifying and enforcing security policies on untrusted third-party code. We call this third-party code plugins, as SURGESCAN supports both statically and dynamically loaded code. SURGESCAN consists of a static analysis component and code rewriting component. To use SURGESCAN, the app developer selects a security policy that declares security-sensitive methods in the Android API. Then, using static analysis, SURGESCAN finds all the Android API calls in the plugin binary that may reach those security-sensitive methods, and generates AspectJ code for enforcing the security policy on those API calls. Next, SURGESCAN runs AspectJ to weave the policy into the plugin. After that, the app can safely load the plugin. SURGESCAN requires no modification to the OS and incurs negligible runtime overhead. We describe our algorithms for achieving high accuracy in our static analysis. To evaluate SURGESCAN, we designed policies on network and sensor access and applied them to open source apps. We demonstrated various use scenarios for SURGESCAN, including securing distributed network measurement, securing ad libraries, controlling UI and screen estate, and patching applications.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Fine Grained Confinement of Untrusted Third-Party Applications in Android
    Pande, Prateek
    Mallaiah, Kurra
    Gandhi, Rishi Kumar
    Medatiya, Amit Kumar
    Srinivasachary, S.
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 372 - 376
  • [2] Dynamic privacy leakage analysis of Android third-party libraries
    He, Yongzhong
    Yang, Xuejun
    Hu, Binghui
    Wang, Wei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 259 - 270
  • [3] Dynamic Privacy Leakage Analysis of Android Third-party Libraries
    He, Yongzhong
    Hu, Binghui
    Han, Zhen
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 275 - 280
  • [4] LibSift: Automated Detection of Third-Party Libraries in Android Applications
    Soh, Charlie
    Tan, Hee Beng Kuan
    Arnatovich, Yauhen Leanidavich
    Narayanan, Annamalai
    Wang, Lipo
    2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016), 2016, : 41 - 48
  • [5] Splitting Third-Party Libraries' Privileges from Android Apps
    Zhan, Jiawei
    Zhou, Quan
    Gu, Xiaozhuo
    Wang, Yuewu
    Niu, Yingjiao
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 80 - 94
  • [6] LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications
    Qiu, Jun
    Yang, Xuewu
    Wu, Huamao
    Zhou, Yajin
    Li, Jinku
    Ma, Jianfeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2873 - 2889
  • [7] LIBID: Reliable Identification of Obfuscated Third-Party Android Libraries
    Zhang, Jiexin
    Beresford, Alastair R.
    Kolhnann, Stephan A.
    PROCEEDINGS OF THE 28TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (ISSTA '19), 2019, : 55 - 65
  • [8] Security analysis and enhancement of third-party android push service
    Lu Y.
    Li Y.
    Ying L.
    Gu Y.
    Su P.
    Feng D.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (11): : 2431 - 2445
  • [9] A methodology for the security evaluation within third-party Android Marketplaces
    Buchanan, William J.
    Chiale, Simone
    Macfarlane, Richard
    DIGITAL INVESTIGATION, 2017, 23 : 88 - 98
  • [10] Keyboard or Keylogger?: a security analysis of third-party keyboards on Android
    Cho, Junsung
    Cho, Geumhwan
    Kim, Hyoungshick
    2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2015, : 173 - 176