Ghost Installer in the Shadow: Security Analysis of App Installation on Android

被引:5
|
作者
Lee, Yeonjoon [1 ]
Li, Tongxin [2 ]
Zhang, Nan [1 ]
Demetriou, Soteris [3 ]
Zha, Mingming [4 ]
Wang, XiaoFeng [1 ]
Chen, Kai [4 ]
Zhou, Xiaoyong [5 ]
Han, Xinhui [2 ]
Grace, Michael [5 ]
机构
[1] Indiana Univ, Bloomington, IN 47405 USA
[2] Peking Univ, Beijing, Peoples R China
[3] Univ Illinois, Champaign, IL USA
[4] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[5] Samsung Res Amer, Mountain View, CA USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/DSN.2017.33
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Android allows developers to build apps with app installation functionality themselves with minimal restriction and support like any other functionalities. Given the critical importance of app installation, the security implications of the approach can be significant. This paper reports the first systematic study on this issue, focusing on the security guarantees of different steps of the App Installation Transaction (AIT). We demonstrate the serious consequences of leaving AIT development to individual developers: most installers (e.g., Amazon AppStore, DTIgnite, Baidu) are riddled with various security-critical loopholes, which can be exploited by attackers to silently install any apps, acquiring dangerous-level permissions or even unauthorized access to system resources. Surprisingly, vulnerabilities were found in all steps of AIT. The attacks we present, dubbed Ghost Installer Attack (GIA), are found to pose a realistic threat to Android ecosystem. Further, we developed both a user-app-level and a system-level defense that are innovative and practical.
引用
收藏
页码:403 / 414
页数:12
相关论文
共 50 条
  • [41] Android Security via Static Program Analysis
    Shen, Feng
    MOBISYS'17 PHD FORUM: PROCEEDINGS OF THE 2017 WORKSHOP ON MOBISYS 2017 PH.D. FORUM, 2017, : 19 - 20
  • [42] AndroidProtect: Android Apps Security Analysis System
    Zhang, Tong
    Li, Tao
    Wang, Hao
    Xiao, Zhijie
    COLLABORATE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2016, 2017, 201 : 583 - 594
  • [43] Security Analysis of Mobile Money Applications on Android
    Darvish, Hesham
    Husain, Mohammad
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 3072 - 3078
  • [44] Automated Repair of Information Flow Security in Android Implicit Inter-App Communication
    Tiwari, Abhishek
    Prakash, Jyoti
    Dong, Zhen
    Furia, Carlo A.
    FORMAL METHODS, PT I, FM 2024, 2025, 14933 : 285 - 303
  • [45] Analysis of an ehealth app: Privacy, security and usability
    Alturki R.
    AlGhamdi M.J.
    Gay V.
    Awan N.
    Kundi M.
    Alshehri M.
    International Journal of Advanced Computer Science and Applications, 2020, 11 (04): : 209 - 214
  • [46] Android Data Storage Locations and What App Developers Do with It from a Security and Privacy Perspective
    Heid, Kris
    Tefke, Tobias
    Heider, Jens
    Staudemeyer, Ralf C.
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 378 - 387
  • [47] Analysis of an eHealth app: Privacy, Security and Usability
    Alturki, Ryan
    AlGhamdi, Mohammed J.
    Awan, Nabeela
    Kundi, Mehwish
    Gay, Valerie
    Alshehri, Mohammad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (04) : 209 - 214
  • [48] From guidelines to practice: assessing Android app developer compliance with google's security recommendations
    Yang, Shishuai
    Hou, Qinsheng
    Li, Shuang
    Xu, Fenghao
    Diao, Wenrui
    EMPIRICAL SOFTWARE ENGINEERING, 2025, 30 (01)
  • [49] Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy
    Duc Cuong Nguyen
    Derr, Erik
    Backes, Michael
    Bugiel, Sven
    2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 555 - 569
  • [50] Automatic system for measuring security risk of Android application from third party app store
    Jang, Bogyu
    Lee, Jaeseung
    Lee, Manhee
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3190 - 3196