File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/2185448.2185466
- Scopus: eid_2-s2.0-84860696959
Conference Paper: DroidChecker: analyzing Android applications for capability leak
Title | DroidChecker: analyzing Android applications for capability leak |
---|---|
Authors | |
Keywords | Taint Checking Privilege Escalation Attack Control Flow Checking Capability Leaks Android |
Issue Date | 2012 |
Publisher | Association for Computing Machinery. |
Citation | The 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '12), In Proceedings of the 5th WiSec, 2012, p. 125-136 How to Cite? |
Abstract | While Apple has checked every app available on the App Store, Google takes another approach that allows anyone to publish apps on the Android Market. The openness of the Android Market attracts both benign and malicious developers. The security of the Android platform relies mainly on sandboxing applications and restricting their capabilities such that no application, by default, can perform any operations that would adversely impact other applications, the operating system, or the user. However, a recent research reported that a genuine but vulnerable application may leak its capabilities to other applications. When being leveraged, other applications can gain extra capabilities which they are not granted originally. We present DroidChecker, an Android application analyzing tool which searches for the aforementioned vulnerability in Android applications. Droid- Checker uses interprocedural control flow graph searching and static taint checking to detect exploitable data paths in an Android application. We analyzed more than 1100 Android applications using DroidChecker and found 6 previously unknown vulnerable applications including the renowned Adobe Photoshop Express application. We have also developed a malicious application that exploits the previously unknown vulnerability found in the Adobe Photoshop Express application. We show that the malicious application, which is not granted any permissions, can access contacts on the phone with just a few lines of code. Copyright 2012 ACM. |
Persistent Identifier | http://hdl.handle.net/10722/152040 |
ISBN | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chan, PPF | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.date.accessioned | 2012-06-26T06:32:46Z | - |
dc.date.available | 2012-06-26T06:32:46Z | - |
dc.date.issued | 2012 | en_US |
dc.identifier.citation | The 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '12), In Proceedings of the 5th WiSec, 2012, p. 125-136 | en_US |
dc.identifier.isbn | 978-1-4503-1265-3 | - |
dc.identifier.uri | http://hdl.handle.net/10722/152040 | - |
dc.description.abstract | While Apple has checked every app available on the App Store, Google takes another approach that allows anyone to publish apps on the Android Market. The openness of the Android Market attracts both benign and malicious developers. The security of the Android platform relies mainly on sandboxing applications and restricting their capabilities such that no application, by default, can perform any operations that would adversely impact other applications, the operating system, or the user. However, a recent research reported that a genuine but vulnerable application may leak its capabilities to other applications. When being leveraged, other applications can gain extra capabilities which they are not granted originally. We present DroidChecker, an Android application analyzing tool which searches for the aforementioned vulnerability in Android applications. Droid- Checker uses interprocedural control flow graph searching and static taint checking to detect exploitable data paths in an Android application. We analyzed more than 1100 Android applications using DroidChecker and found 6 previously unknown vulnerable applications including the renowned Adobe Photoshop Express application. We have also developed a malicious application that exploits the previously unknown vulnerability found in the Adobe Photoshop Express application. We show that the malicious application, which is not granted any permissions, can access contacts on the phone with just a few lines of code. Copyright 2012 ACM. | en_US |
dc.language | eng | en_US |
dc.publisher | Association for Computing Machinery. | - |
dc.relation.ispartof | Proceedings of the 5th ACM conference on Security and Privacy in Wireless and Mobile Networks, WiSec '12 | en_US |
dc.rights | Proceedings of the 5th ACM conference on Security and Privacy in Wireless and Mobile Networks, WiSec '12. Copyright © Association for Computing Machinery. | - |
dc.subject | Taint Checking | en_US |
dc.subject | Privilege Escalation Attack | en_US |
dc.subject | Control Flow Checking | en_US |
dc.subject | Capability Leaks | en_US |
dc.subject | Android | en_US |
dc.title | DroidChecker: analyzing Android applications for capability leak | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Chan, PPF: pfchan@cs.hku.hk | en_US |
dc.identifier.email | Hui, LCK: hui@cs.hku.hk | en_US |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | - |
dc.identifier.authority | Hui, LCK=rp00120 | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.description.nature | link_to_OA_fulltext | en_US |
dc.identifier.doi | 10.1145/2185448.2185466 | en_US |
dc.identifier.scopus | eid_2-s2.0-84860696959 | en_US |
dc.identifier.hkuros | 208238 | - |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-84860696959&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.spage | 125 | en_US |
dc.identifier.epage | 136 | en_US |
dc.publisher.place | United States | - |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_US |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_US |
dc.identifier.scopusauthorid | Chan, PPF=52563246100 | en_US |
dc.identifier.citeulike | 10575696 | - |
dc.customcontrol.immutable | sml 130326 | - |