Are Android Apps Being Protected Well Against Attacks?

被引:2
|
作者
Ma, Siqi [1 ]
Liu, Yang [2 ]
Nepal, Surya [3 ]
机构
[1] Univ Queensland, Brisbane, Qld, Australia
[2] Xidian Univ, Comp Sci & Technol, Xian, Peoples R China
[3] CSIRO, Data61, Canberra, ACT, Australia
关键词
AUTHENTICATION;
D O I
10.1109/MWC.001.1900432
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is the most pervasive means for developers to protect users' private data against attacks while using mobile applications. Incorrect implementations of authentication make users' accounts vulnerable to several attacks such as eavesdropping attacks, reply attacks, and man-inthe- middle attacks, and thus break the first line of defense in securing mobile services. To solve this problem, we design a system that learns patterns from authentication bugs, and identifies incorrect authentication implementations from mobile applications. By conducting a static analysis, our system extracts control and data dependencies for further pattern learning and utilizes a machine learning algorithm to build a classification model. To distinguish whether an application contains any authentication bugs, we take the unknown application as an input and recognize the vulnerable patterns. To evaluate the accuracy of our system, we collected 1200 Android applications from the official Google Play store, representing a variety of categories. We compare our system with MalloDroid, a state-of-the-art tool for SSL/ TLS authentication bug detection. Our system successfully identifies 691 SSL/TLS authentication bugs with precision, recall, and F1 value as 52.75, 93.89, and 67.55 percent, respectively.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [1] AppIS: Protect Android Apps Against Runtime Repackaging Attacks
    Song, Lina
    Tang, Zhanyong
    Li, Zhen
    Gong, Xiaoqing
    Chen, Xiaojiang
    Fang, Dingyi
    Wang, Zheng
    2017 IEEE 23RD INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2017, : 25 - 32
  • [2] Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks
    Chen, Kai
    Zhang, Yingjun
    Liu, Peng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (08) : 1879 - 1893
  • [3] Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
    Choi, Hyunwoo
    Kim, Yongdae
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [4] Stealthy Privacy Attacks Against Mobile AR Apps
    Lehman, Sarah M.
    Alrumayh, Abrar S.
    Ling, Haibin
    Tan, Chiu C.
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [5] Obfuscating Code Vulnerabilities Against Static Analysis in Android Apps
    Pagano, Francesco
    Verderame, Luca
    Merlo, Alessio
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2024, 2024, 710 : 381 - 395
  • [6] A Defensive Strategy Against Android Adversarial Malware Attacks
    Atedjio, Fabrice Setephin
    Lienou, Jean-Pierre
    Nelson, Frederica F.
    Shetty, Sachin S.
    Kamhoua, Charles A.
    IEEE ACCESS, 2024, 12 : 169432 - 169441
  • [7] Risk measurement method for privilege escalation attacks on android apps based on process algebra
    Shen, Limin
    Li, Hui
    Wang, Hongyi
    Wang, Yihuan
    Feng, Jiayin
    Jian, Yuqing
    Information (Switzerland), 2020, 11 (06):
  • [8] Risk Measurement Method for Privilege Escalation Attacks on Android Apps Based on Process Algebra
    Shen, Limin
    Li, Hui
    Wang, Hongyi
    Wang, Yihuan
    Feng, Jiayin
    Jian, Yuqing
    INFORMATION, 2020, 11 (06)
  • [9] Protecting Android Apps Against Reverse Engineering by the Use of the Native Code
    Protsenko, Mykola
    Mueller, Tilo
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 99 - 110
  • [10] Using Health and Well-Being Apps for Behavior Change: A Systematic Search and Rating of Apps
    McKay, Fiona H.
    Wright, Annemarie
    Shill, Jane
    Stephens, Hugh
    Uccellini, Mary
    JMIR MHEALTH AND UHEALTH, 2019, 7 (07):