首页> 美国卫生研究院文献>other >Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks
【2h】

Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

机译:在混合Web /移动应用程序框架中破坏和修复基于源的访问控制

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc.Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device.We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed.We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content and explain why they are ineffectual.We then present NoFrak, a capability-based defense against fracking attacks. NoFrak is platform-independent, compatible with any framework and embedded browser, requires no changes to the code of the existing hybrid apps, and does not break their advertising-supported business model.
机译:混合移动应用程序(应用程序)结合了Web应用程序和“本机”移动应用程序的功能。像Web应用程序一样,它们以可移植的,与平台无关的语言(例如HTML和JavaScript)实现。像本机应用程序一样,它们可以直接访问本地设备资源-文件系统,位置,摄像头,联系人等。混合应用程序通常是使用混合应用程序框架(例如PhoneGap)开发的。该框架的目的是双重的。首先,它提供了嵌入式Web浏览器(例如Android上的WebView),该浏览器执行应用程序的Web代码。其次,它提供了“桥梁”,使Web代码可以逃脱浏览器并访问设备上的本地资源。我们分析了混合框架创建的软件堆栈,并证明它不能正确地组成管理Web代码和本地文件的访问控制策略。代码。 Web代码由相同的原始策略控制,而本地代码由操作系统的访问控制策略(例如,Android中用户授予的权限)控制。框架添加到浏览器的网桥具有与整个应用程序相同的本地访问权限,但是没有受到相同来源策略的正确保护。这为压裂攻击打开了大门,这种攻击使混合应用程序中包含的外来Web内容(例如,限制在iframe中的广告)可以钻取层并直接访问设备资源。裂痕漏洞是通用的:它们会影响所有混合框架,所有嵌入式Web浏览器,所有桥接机制以及部署这些框架的所有平台。每个漏洞都会向数十个潜在的恶意Web域公开敏感的本地资源(即读取和写入联系人列表,本地文件等的能力)。我们还分析了混合框架部署的防御措施,以防止外来Web内容访问资源并解释它们为何无效。然后介绍NoFrak,这是一种基于功能的防御压裂攻击的防御方法。 NoFrak与平台无关,可与任何框架和嵌入式浏览器兼容,无需更改现有混合应用程序的代码,并且不会破坏其广告支持的业务模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号