Ghost Installer in the Shadow: Security Analysis of App Installation on Android

被引:5
|
作者
Lee, Yeonjoon [1 ]
Li, Tongxin [2 ]
Zhang, Nan [1 ]
Demetriou, Soteris [3 ]
Zha, Mingming [4 ]
Wang, XiaoFeng [1 ]
Chen, Kai [4 ]
Zhou, Xiaoyong [5 ]
Han, Xinhui [2 ]
Grace, Michael [5 ]
机构
[1] Indiana Univ, Bloomington, IN 47405 USA
[2] Peking Univ, Beijing, Peoples R China
[3] Univ Illinois, Champaign, IL USA
[4] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[5] Samsung Res Amer, Mountain View, CA USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/DSN.2017.33
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Android allows developers to build apps with app installation functionality themselves with minimal restriction and support like any other functionalities. Given the critical importance of app installation, the security implications of the approach can be significant. This paper reports the first systematic study on this issue, focusing on the security guarantees of different steps of the App Installation Transaction (AIT). We demonstrate the serious consequences of leaving AIT development to individual developers: most installers (e.g., Amazon AppStore, DTIgnite, Baidu) are riddled with various security-critical loopholes, which can be exploited by attackers to silently install any apps, acquiring dangerous-level permissions or even unauthorized access to system resources. Surprisingly, vulnerabilities were found in all steps of AIT. The attacks we present, dubbed Ghost Installer Attack (GIA), are found to pose a realistic threat to Android ecosystem. Further, we developed both a user-app-level and a system-level defense that are innovative and practical.
引用
收藏
页码:403 / 414
页数:12
相关论文
共 50 条
  • [1] Security Analysis of a mHealth App in Android: Problems and Solutions
    de la Torre-Diez, Isabel
    Trinchet, Bruno Olivar
    Rodrigues, Joel J. P. C.
    Lopez-Coronado, Miguel
    2017 IEEE 19TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2017,
  • [2] LegoDroid: flexible Android app decomposition and instant installation
    Yi Liu
    Yun Ma
    Xusheng Xiao
    Tao Xie
    Xuanzhe Liu
    Science China Information Sciences, 2023, 66
  • [3] LegoDroid: flexible Android app decomposition and instant installation
    Yi LIU
    Yun MA
    Xusheng XIAO
    Tao XIE
    Xuanzhe LIU
    ScienceChina(InformationSciences), 2023, 66 (04) : 155 - 173
  • [4] LegoDroid: flexible Android app decomposition and instant installation
    Liu, Yi
    Ma, Yun
    Xiao, Xusheng
    Xie, Tao
    Liu, Xuanzhe
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (04)
  • [5] Analysis of Android Inter-App Security Vulnerabilities Using COVERT
    Sadeghi, Alireza
    Bagheri, Hamid
    Malek, Sam
    2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, 2015, : 725 - 728
  • [6] Enhancing Android Security Through App Splitting
    Davidson, Drew
    Rastogi, Vaibhav
    Christodorescu, Mihai
    Jha, Somesh
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 24 - 44
  • [7] On the Evolution of Security Issues in Android App Versions
    Kalysch, Anatoli
    Schilling, Joschua
    Mueller, Tilo
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 523 - 541
  • [8] Research on Security Protection Mechanism of Android APP
    Zhao, Shu-han
    Li, Yong-zhen
    Wang, Zhen-zhen
    Jin, Zhe-xue
    2024 4TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING, ICICSE 2024, 2024, : 35 - 38
  • [9] A comprehensive framework for inter-app ICC security analysis of Android apps
    Nirumand, Atefeh
    Zamani, Bahman
    Ladani, Behrouz Tork
    AUTOMATED SOFTWARE ENGINEERING, 2024, 31 (02)
  • [10] Are free Android app security analysis tools effective in detecting known vulnerabilities?
    Venkatesh-Prasad Ranganath
    Joydeep Mitra
    Empirical Software Engineering, 2020, 25 : 178 - 219