Navigating Through SSL/TLS Implementation Vulnerabilities in Vehicle-related iOS Apps

被引:0
|
作者
Auerbach, Jacob M. [1 ]
Zhang, Linxi [1 ]
机构
[1] Cent Michigan Univ, Dept Comp Sci, Mt Pleasant, MI 48859 USA
关键词
D O I
10.1109/ICMI60790.2024.10586066
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As vehicles become increasingly connected, introducing advanced features like remote engine start for enhanced safety and convenience, automotive cybersecurity becomes even more important. Vehicle-related applications, directly interfacing with car control systems, pose significant risks if their security is compromised. These applications often rely on SSL/TLS (Secure Socket Layer/Transport Layer Security) protocols for secure internet connections and data protection. However, improper SSL/TLS implementations can lead to vulnerabilities and subsequent cyberattacks. In addition, most existing research has focused on Android, leaving a gap in understanding iOS app security in this context. Our research aims to fill this gap by examining 278 iOS vehicle-related applications across various categories including Original Equipment Manufacturer (OEM)-developed apps, car insurance apps, car-related apps, and On-Board Diagnostics-II (OBD-II) tool apps. Particularly, to effectively assess the SSL/TLS implementation, we employ Man-In-The-Middle (MITM) attacks, a technique mirroring real-world hacking strategies. This approach allows us to evaluate the apps' resilience against such attacks and identify vulnerabilities in their SSL/TLS protocols. We identify 5 of these applications that have vulnerabilities, compromising sensitive data. Moreover, we develop machine learning techniques to create a detection tool, enhancing detection capabilities. By using traffic data from the apps we tested and employing random forest, the proposed model achieves a 99.91% accuracy rate in identifying vulnerabilities.
引用
收藏
页数:6
相关论文
共 3 条
  • [1] Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis
    Wang, Yingjie
    Xu, Guangquan
    Liu, Xing
    Mao, Weixuan
    Si, Chengxiang
    Pedrycz, Witold
    Wang, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 167
  • [2] Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis
    Wang, Li
    Yang, Yi
    Alavalapati, Goutham Reddy
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT II, SECURECOMM 2023, 2025, 568 : 371 - 394
  • [3] SMV-HUNTER: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps
    Sounthiraraj, David
    Sahs, Justin
    Greenwood, Garrett
    Lin, Zhiqiang
    Khan, Latifur
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,