首页> 外文会议>International Conference on Financial Cryptography and DataSecurity >Android UI Deception Revisited: Attacks and Defenses
【24h】

Android UI Deception Revisited: Attacks and Defenses

机译:Android UI欺骗重新审视:攻击和防御

获取原文

摘要

App-based deception attacks are increasingly a problem on mobile devices and they are used to steal passwords, credit card numbers, text messages, etc. Current versions of Android are susceptible to these attacks. Recently, Bianchi et al. proposed a novel solution "What the App is That" that included a host-based system to identify apps to users via a security indicator and help assure them that their input goes to the identified apps [7]. Unfortunately, we found that the solution has a significant side channel vulnerability as well as susceptibility to click-jacking that allow non-privileged malware to completely compromise the defenses, and successfully steal passwords or other keyboard input. We discuss the vulnerabilities found, propose possible defenses, and then evaluate the defenses against different types of UI deception attacks.
机译:基于应用的欺骗攻击越来越多地是移动设备问题,它们用于窃取密码,信用卡号,短信等.NAndroid的当前版本易于这些攻击。最近,Bianchi等人。提出了一种新的解决方案“该应用程序是什么”,其中包括基于主机的系统,以通过安全指示符向用户识别应用程序,并帮助他们向其输入转到所识别的应用[7]。不幸的是,我们发现该解决方案具有重要的侧面通道漏洞以及点击允许允许非特权恶意软件完全损害防御的易感性,并成功窃取密码或其他键盘输入的易感性。我们讨论发现的漏洞,提出可能的防御,然后评估不同类型的UI欺骗攻击的防御。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号