A Multi-Tier Security Analysis of Official Car Management Apps for Android

被引:7
|
作者
Chatzoglou, Efstratios [1 ]
Kambourakis, Georgios [2 ]
Kouliaridis, Vasileios [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Samos 81300, Greece
[2] European Union, Joint Res Ctr, I-21027 Ispra, Italy
来源
FUTURE INTERNET | 2021年 / 13卷 / 03期
关键词
smart cars; digital automotive services; security; privacy; Android; vulnerability assessment; dynamic analysis; static analysis;
D O I
10.3390/fi13030058
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of software updates. On the other hand, the continuous tracking of the vehicle data by such apps may also pose a risk to the car owner, if, say, sensitive pieces of information are leaked to third parties or the app is vulnerable to attacks. This work contributes the first to our knowledge full-fledged security assessment of all the official single-vehicle management apps offered by major car manufacturers who operate in Europe. The apps are scrutinised statically with the purpose of not only identifying surfeits, say, in terms of the permissions requested, but also from a vulnerability assessment viewpoint. On top of that, we run each app to identify possible weak security practices in the owner-to-app registration process. The results reveal a multitude of issues, ranging from an over-claim of sensitive permissions and the use of possibly privacy-invasive API calls, to numerous potentially exploitable CWE and CVE-identified weaknesses and vulnerabilities, the, in some cases, excessive employment of third-party trackers, and a number of other flaws related to the use of third-party software libraries, unsanitised input, and weak user password policies, to mention just a few.
引用
收藏
页码:1 / 35
页数:35
相关论文
共 23 条
  • [1] Security and Privacy Analysis of Android Family Locator Apps
    Alkhattabi, Khalid
    Alshehri, Ahmed
    Yue, Chuan
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 47 - 58
  • [2] LWeb: Information Flow Security or Multi-tier Web Applications
    Parker, James
    Vazou, Niki
    Hicks, Michael
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2019, 3 (POPL):
  • [3] Hybrid Analysis of Android Apps for Security Vetting using Deep Learning
    Chaulagain, Dewan
    Poudel, Prabesh
    Pathak, Prabesh
    Roy, Sankardas
    Caragea, Doina
    Liu, Guojun
    Ou, Xinming
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [4] An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps
    Sentana, I. Wayan Budi
    Ikram, Muhammad
    Kaafar, Mohamed Ali
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 699 - 725
  • [5] When Harry Met Tinder: Security Analysis of Dating Apps on Android
    Kim, Kuyju
    Kim, Taeyun
    Lee, Seungjin
    Kim, Soolin
    Kim, Hyoungshick
    SECURE IT SYSTEMS, 2018, 11252 : 454 - 467
  • [6] A multi-tier, multi-role security framework for E-commerce systems
    Cachia, Emest
    Micallef, Mark
    ECBS 2007: 14TH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS: RAISING EXPECTATIONS OF COMPUTER-BASES SYSTEMS, 2007, : 422 - +
  • [7] Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications
    De Ryck, Philippe
    Desmet, Lieven
    Joosen, Wouter
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2011, 6542 : 114 - 127
  • [8] Android Apps Security Assessment using Sentiment Analysis Techniques: Comparative Study
    Aljumah A.
    Altuwijri A.
    Alsuhaibani T.
    Selmi A.
    Alruhaily N.
    International Journal of Interactive Mobile Technologies, 2021, 15 (24) : 123 - 133
  • [9] Formal Analysis of Privacy Requirements Specifications for Multi-tier Applications
    Breaux, Travis D.
    Rao, Ashwini
    2013 21ST IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2013, : 14 - 23
  • [10] Security analysis of permission re-delegation vulnerabilities in Android apps
    Biniam Fisseha Demissie
    Mariano Ceccato
    Lwin Khin Shar
    Empirical Software Engineering, 2020, 25 : 5084 - 5136