首页> 外文会议>European Symposium on Security and Privacy >Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications
【24h】

Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications

机译:打开Bob和Mallory的门:在Android应用程序和安全隐患中打开端口使用情况

获取原文

摘要

Open ports are typically used by server software to serve remote clients, and the usage historically leads to remote exploitation due to insufficient protection. Smartphone operating systems inherit the open port support, but since they are significantly different from traditional server machines in performance and availability guarantees, little is known about how smartphone applications use open ports and what the security implications are. In this paper, we perform the first systematic study of open port usage on mobile platform and their security implications. To achieve this goal, we design and implement OPAnalyzer, a static analysis tool which can effectively identify and characterize vulnerable open port usage in Android applications. Using OPAnalyzer, we perform extensive usage and vulnerability analysis on a dataset with over 100K Android applications. OPAnalyzer successfully classifies 99% of the mobile usage of open ports into 5 distinct families, and from the output, we are able to identify several mobile-specific usage scenarios such as data sharing in physical proximity. In our subsequent vulnerability analysis, we find that nearly half of the usage is unprotected and can be directly exploited remotely. From the identified vulnerable usage, we discover 410 vulnerable applications with 956 potential exploits in total. We manually confirmed the vulnerabilities for 57 applications, including popular ones with 10 to 50 million downloads on the official market, and also an app that is pre-installed on some device models. These vulnerabilities can be exploited to cause highly-severe damage such as remotely stealing contacts, photos, and even security credentials, and also performing sensitive actions such as malware installation and malicious code execution. We have reported these vulnerabilities and already got acknowledged by the application developers for some of them. We also propose countermeasures and improved practices for each usage scenario.
机译:服务器软件通常使用开放端口来服务远程客户端,并且使用历史地导致由于保护不足而导致远程利用。智能手机操作系统继承了开放式端口支持,但由于它们与传统的服务器计算机的性能和可用性保证有很大不同,因此智能手机应用程序如何使用开放端口以及安全含义是什么知之甚少。在本文中,我们在移动平台上执行开放端口使用的第一个系统研究及其安全含义。为实现这一目标,我们设计和实现Opanalyzer,一个静态分析工具,可以有效地识别和表征Android应用程序中的易受攻击的开放端口使用。使用Opanalyzer,我们对数据集进行广泛的使用和漏洞分析,具有超过100k Android应用程序。 Opanalyzer成功将开放端口的99%分类为5个不同的家庭,以及从输出,我们能够识别几种特定于移动的使用情况,如物理接近的数据共享。在我们随后的漏洞分析中,我们发现近一半的使用是不受保护的,并且可以远程剥削。从所识别的弱势使用中,我们发现410个易受攻击的应用程序,总共有956个潜在的利用。我们手动确认了57个应用程序的漏洞,包括在官方市场上有10到5000万下载的流行,也是预先安装在某些设备模型上的应用程序。这些漏洞可以被利用,以造成高度严重的损坏,例如远程窃取联系人,照片甚至安全凭证,以及执行敏感的动作,如恶意软件安装和恶意代码执行。我们报告了这些漏洞,并已由应用程序开发人员承认其中一些人。我们还提出了对每个使用情况的对策和改进的做法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号