File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: DroidChecker: analyzing Android applications for capability leak

TitleDroidChecker: analyzing Android applications for capability leak
Authors
KeywordsTaint Checking
Privilege Escalation Attack
Control Flow Checking
Capability Leaks
Android
Issue Date2012
PublisherAssociation for Computing Machinery.
Citation
The 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '12), In Proceedings of the 5th WiSec, 2012, p. 125-136 How to Cite?
AbstractWhile Apple has checked every app available on the App Store, Google takes another approach that allows anyone to publish apps on the Android Market. The openness of the Android Market attracts both benign and malicious developers. The security of the Android platform relies mainly on sandboxing applications and restricting their capabilities such that no application, by default, can perform any operations that would adversely impact other applications, the operating system, or the user. However, a recent research reported that a genuine but vulnerable application may leak its capabilities to other applications. When being leveraged, other applications can gain extra capabilities which they are not granted originally. We present DroidChecker, an Android application analyzing tool which searches for the aforementioned vulnerability in Android applications. Droid- Checker uses interprocedural control flow graph searching and static taint checking to detect exploitable data paths in an Android application. We analyzed more than 1100 Android applications using DroidChecker and found 6 previously unknown vulnerable applications including the renowned Adobe Photoshop Express application. We have also developed a malicious application that exploits the previously unknown vulnerability found in the Adobe Photoshop Express application. We show that the malicious application, which is not granted any permissions, can access contacts on the phone with just a few lines of code. Copyright 2012 ACM.
Persistent Identifierhttp://hdl.handle.net/10722/152040
ISBN
References

 

DC FieldValueLanguage
dc.contributor.authorChan, PPFen_US
dc.contributor.authorHui, LCKen_US
dc.contributor.authorYiu, SMen_US
dc.date.accessioned2012-06-26T06:32:46Z-
dc.date.available2012-06-26T06:32:46Z-
dc.date.issued2012en_US
dc.identifier.citationThe 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '12), In Proceedings of the 5th WiSec, 2012, p. 125-136en_US
dc.identifier.isbn978-1-4503-1265-3-
dc.identifier.urihttp://hdl.handle.net/10722/152040-
dc.description.abstractWhile Apple has checked every app available on the App Store, Google takes another approach that allows anyone to publish apps on the Android Market. The openness of the Android Market attracts both benign and malicious developers. The security of the Android platform relies mainly on sandboxing applications and restricting their capabilities such that no application, by default, can perform any operations that would adversely impact other applications, the operating system, or the user. However, a recent research reported that a genuine but vulnerable application may leak its capabilities to other applications. When being leveraged, other applications can gain extra capabilities which they are not granted originally. We present DroidChecker, an Android application analyzing tool which searches for the aforementioned vulnerability in Android applications. Droid- Checker uses interprocedural control flow graph searching and static taint checking to detect exploitable data paths in an Android application. We analyzed more than 1100 Android applications using DroidChecker and found 6 previously unknown vulnerable applications including the renowned Adobe Photoshop Express application. We have also developed a malicious application that exploits the previously unknown vulnerability found in the Adobe Photoshop Express application. We show that the malicious application, which is not granted any permissions, can access contacts on the phone with just a few lines of code. Copyright 2012 ACM.en_US
dc.languageengen_US
dc.publisherAssociation for Computing Machinery.-
dc.relation.ispartofProceedings of the 5th ACM conference on Security and Privacy in Wireless and Mobile Networks, WiSec '12en_US
dc.rightsProceedings of the 5th ACM conference on Security and Privacy in Wireless and Mobile Networks, WiSec '12. Copyright © Association for Computing Machinery.-
dc.subjectTaint Checkingen_US
dc.subjectPrivilege Escalation Attacken_US
dc.subjectControl Flow Checkingen_US
dc.subjectCapability Leaksen_US
dc.subjectAndroiden_US
dc.titleDroidChecker: analyzing Android applications for capability leaken_US
dc.typeConference_Paperen_US
dc.identifier.emailChan, PPF: pfchan@cs.hku.hken_US
dc.identifier.emailHui, LCK: hui@cs.hku.hken_US
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.identifier.authorityHui, LCK=rp00120en_US
dc.identifier.authorityYiu, SM=rp00207en_US
dc.description.naturelink_to_OA_fulltexten_US
dc.identifier.doi10.1145/2185448.2185466en_US
dc.identifier.scopuseid_2-s2.0-84860696959en_US
dc.identifier.hkuros208238-
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-84860696959&selection=ref&src=s&origin=recordpageen_US
dc.identifier.spage125en_US
dc.identifier.epage136en_US
dc.publisher.placeUnited States-
dc.identifier.scopusauthoridYiu, SM=7003282240en_US
dc.identifier.scopusauthoridHui, LCK=8905728300en_US
dc.identifier.scopusauthoridChan, PPF=52563246100en_US
dc.identifier.citeulike10575696-
dc.customcontrol.immutablesml 130326-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats