首页> 外文OA文献 >Code Injection Attacks on HTML5-based Mobile Apps
【2h】

Code Injection Attacks on HTML5-based Mobile Apps

机译:基于HTmL5的移动应用程序的代码注入攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

HTML5-based mobile apps become more and more popular, mostly because they aremuch easier to be ported across different mobile platforms than native apps.HTML5-based apps are implemented using the standard web technologies, includingHTML5, JavaScript and CSS; they depend on some middlewares, such as PhoneGap,to interact with the underlying OS. Knowing that JavaScript is subject to code injection attacks, we haveconducted a systematic study on HTML5-based mobile apps, trying to evaluatewhether it is safe to rely on the web technologies for mobile app development.Our discoveries are quite surprising. We found out that if HTML5-based mobileapps become popular--it seems to go that direction based on the currentprojection--many of the things that we normally do today may become dangerous,including reading from 2D barcodes, scanning Wi-Fi access points, playing MP4videos, pairing with Bluetooth devices, etc. This paper describes howHTML5-based apps can become vulnerable, how attackers can exploit theirvulnerabilities through a variety of channels, and what damage can be achievedby the attackers. In addition to demonstrating the attacks through exampleapps, we have studied 186 PhoneGap plugins, used by apps to achieve a varietyof functionalities, and we found that 11 are vulnerable. We also found two realHTML5-based apps that are vulnerable to the attacks.
机译:基于HTML5的移动应用程序变得越来越流行,主要是因为它们比本机应用程序更易于在不同的移动平台上进行移植。基于HTML5的应用程序使用标准的Web技术(包括HTML5,JavaScript和CSS)来实现;它们依赖某些中间件(例如PhoneGap)与基础操作系统进行交互。知道JavaScript会受到代码注入攻击之后,我们对基于HTML5的移动应用进行了系统的研究,试图评估依靠Web技术进行移动应用开发是否安全,我们的发现令人惊讶。我们发现,如果基于HTML5的移动应用程序流行(似乎按照当前的预测朝这个方向发展),我们今天通常做的许多事情可能会变得危险,包括从2D条码读取,扫描Wi-Fi接入点,播放MP4视频,与蓝牙设备配对等。本文介绍了基于HTML5的应用程序如何变得容易受到攻击,攻击者如何通过各种渠道利用其漏洞,以及攻击者可以造成什么损害。除了通过exampleapps演示攻击之外,我们还研究了186个PhoneGap插件,这些插件被应用程序用来实现各种功能,并且发现有11个易受攻击。我们还发现了两个容易受到攻击的基于RealHTML5的应用程序。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号