The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators

被引:38
作者
Oltrogge, Marten [1 ]
Derr, Erik [1 ]
Stranksy, Christian [1 ]
Acar, Yasemin [3 ]
Fahl, Sascha [3 ]
Rossow, Christian [1 ]
Pellegrino, Giancarlo [1 ,2 ]
Bugiel, Sven [1 ]
Backes, Michael [1 ]
机构
[1] Saarland Univ, CISPA, Saarbrucken, Germany
[2] Stanford Univ, Stanford, CA 94305 USA
[3] Leibniz Univ Hannover, Hannover, Germany
来源
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2018年
关键词
D O I
10.1109/SP.2018.00005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile apps are increasingly created using online application generators (OAGs) that automate app development, distribution, and maintenance. These tools significantly lower the level of technical skill that is required for app development, which makes them particularly appealing to citizen developers, i.e., developers with little or no software engineering background. However, as the pervasiveness of these tools increases, so does their overall influence on the mobile ecosystem's security, as security lapses by such generators affect thousands of generated apps. The security of such generated apps, as well as their impact on the security of the overall app ecosystem, has not yet been investigated. We present the first comprehensive classification of commonly used OAGs for Android and show how to fingerprint uniquely generated apps to link them back to their generator. We thereby quantify the market penetration of these OAGs based on a corpus of 2,291,898 free Android apps from Google Play and discover that at least 11.1% of these apps were created using OAGs. Using a combination of dynamic, static, and manual analysis, we find that the services' app generation model is based on boilerplate code that is prone to reconfiguration attacks in 7/13 analyzed OAGs. Moreover, we show that this boilerplate code includes well-known security issues such as code injection vulnerabilities and insecure WebViews. Given the tight coupling of generated apps with their services' backends, we further identify security issues in their infrastructure. Due to the blackbox development approach, citizen developers are unaware of these hidden problems that ultimately put the end-users sensitive data and privacy at risk and violate the user's trust assumption. A particular worrisome result of our study is that OAGs indeed have a significant amplification factor for those vulnerabilities, notably harming the health of the overall mobile app ecosystem.
引用
收藏
页码:634 / 647
页数:14
相关论文
共 43 条
  • [1] Acar Y, 2016, P 37 IEEE S SEC PRIV
  • [2] Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
    Adrian, David
    Bhargavan, Karthikeyan
    Durumeric, Zakir
    Gaudry, Pierrick
    Green, Matthew
    Halderman, J. Alex
    Heninger, Nadia
    Springall, Drew
    Thome, Emmanuel
    Valenta, Luke
    VanderSloot, Benjamin
    Wustrow, Eric
    Zanella-Beguelin, Santiago
    Zimmermann, Paul
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 5 - 17
  • [3] [Anonymous], 2014, P 21 ANN NETW DISTR
  • [4] [Anonymous], 2012, UNSAFE EXPOSURE ANAL
  • [5] [Anonymous], 2012, P 2012 ACM C COMP CO
  • [6] [Anonymous], 2012, ACM SOUPS
  • [7] [Anonymous], P 2016 ACM SIGSAC C
  • [8] [Anonymous], 2013, P 20 ANN NETW DISTR
  • [9] [Anonymous], 2016, CVE20162107 AES CBE
  • [10] [Anonymous], P 21 ACM C COMP COMM