首页> 外文会议>ACM SIGSAC Conference on Computer and Communications Security >Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References
【24h】

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References

机译:野兔在野生Android中的狩猎:悬挂属性参考威胁的研究

获取原文

摘要

Android is characterized by the complicated relations among its components and apps, through which one party interacts with the other (e.g., starting its activity) by referring to its attributes like package, activity, service, action names, authorities and permissions. Such relations can be easily compromised during a customization: e.g., when an app is removed to fit an Android version to a new device model, while references to the app remain inside that OS. This conflict between the decentralized, unregulated Android customization process and the interdependency among different Android components and apps leads to the pervasiveness of hanging attribute references (Hares), a type of vulnerabilities never investigated before. In our research, we show that popular Android devices are riddled with such flaws, which often have serious security implications: when an attribute (e.g., a package/authority/action name) is used on a device but the party defining it has been removed, a malicious app can fill the gap to acquire critical system capabilities, by simply disguising as the owner of the attribute. More specifically, we discovered in our research that on various Android devices, the malware can exploit their Hares to steal the user's voice notes, control the screen unlock process, replace Google Email's account settings activity and collect or even modify the user's contact without proper permissions. We further designed and implemented Harehunter, a new tool for automatic detection of Hares by comparing attributes defined with those used, and analyzing the references to undefined attributes to determine whether they have been protected (e.g., by signature checking). On the factory images for 97 most popular Android devices, Harehunter discovered 21557 likely Hare flaws, demonstrating the significant impacts of the problem. To mitigate the hazards, we further developed an app for detecting the attempts to exploit Hares on different devices and provide the guidance for avoiding this pitfall when building future systems.
机译:Android的特点是其组件和应用程序中的复杂关系,通过哪个一方通过引用包,活动,服务,操作名称,权限和权限等属性来互动与另一方(例如,启动其活动)。在自定义期间,这种关系可以很容易地损害:例如,当删除应用程序以将Android版本安装到新的设备模型时,而对该应用的引用保留在该操作系统内部。不同的Android组件和应用程序之间的分散,未调节的Android自定义过程和相互依赖性之间的冲突导致悬挂属性引用(HARE)的普及,以前从未调查过的漏洞。在我们的研究中,我们表明流行的Android设备充满了这种缺陷,这些缺陷通常具有严重的安全影响:当设备上使用属性(例如,包/权限/动作名称)但定义它的一方已被删除,恶意应用程序可以通过简单地伪装为属性的所有者来填充差距来获取关键系统功能。更具体地说,我们在我们的研究中发现了在各种Android设备上,恶意软件可以利用他们的野兔来窃取用户的语音笔记,控制屏幕解锁过程,替换Google电子邮件的帐户设置活动并收集甚至在没有适当的权限的情况下收集甚至修改用户的联系人。我们进一步设计和实施了HareHunter,通过比较了使用使用这些所使用的属性来自动检测HARES的新工具,并分析对未定义属性的引用来确定它们是否受到保护(例如,通过签名检查)。在出厂图像中为97个最受欢迎的Android设备,Harehunter发现了21557年的可能性野蛮的漏洞,展示了对问题的重大影响。为了减轻危险,我们进一步开发了一个应用程序,用于检测在不同设备上利用野兔的尝试,并在构建未来系统时提供避免此缺陷的指导。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号