LibGuard: Protecting Sensitive Data In Android Third-Party Libraries From XLDH Attacks

被引:0
|
作者
He, Fannv [1 ]
Wang, Jice [1 ]
Huang, Yuhang [1 ]
Peng, Xiancui [1 ]
Zhang, Yuqing [1 ,2 ]
机构
[1] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
[2] Hainan Univ, Sch Cyberspace Secur, Haikou, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Third-party Library; Attack; Defense; Access control;
D O I
10.1109/ICCCN61486.2024.10637585
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile app vendors/developers extensively integrate third-party libraries into mobile applications. While they enrich the functions of apps, third-party libraries also bring in security risks. It has been widely studied that malicious third-party libraries could collect users' sensitive data from the host apps and the app backend servers. Recent research has reported a new attack vector - malicious libraries strategically target other vendors' library(SDKs) integrated in the same host app to harvest private user data. In this paper, we found two new dimensions of cross library data harvesting(XLDH) attack with serious privacy impacts that start from two new attack surfaces - accessing sensitive fields and accessing sensitive storage. However, the mitigation scheme, significantly, has not been yet studied. To prevent the leaks of sensitive data due to XLDH activities, we first proposed a mitigation scheme - LibGuard, which has been proven to be effective without affecting user's experience on real-world apps.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] mShield: Protecting In-process Sensitive Data Against Vulnerable Third-Party Libraries
    Zhang, Yunming
    Cai, Quanwei
    Li, Houqiang
    Lin, Jingqiang
    Wang, Wei
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 : 496 - 513
  • [2] NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries
    Hong, Yu-Yang
    Wang, Yu-Ping
    Yin, Jie
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 337 - 351
  • [3] Splitting Third-Party Libraries' Privileges from Android Apps
    Zhan, Jiawei
    Zhou, Quan
    Gu, Xiaozhuo
    Wang, Yuewu
    Niu, Yingjiao
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 80 - 94
  • [4] Dynamic privacy leakage analysis of Android third-party libraries
    He, Yongzhong
    Yang, Xuejun
    Hu, Binghui
    Wang, Wei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 259 - 270
  • [5] Dynamic Privacy Leakage Analysis of Android Third-party Libraries
    He, Yongzhong
    Hu, Binghui
    Han, Zhen
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 275 - 280
  • [6] LibSift: Automated Detection of Third-Party Libraries in Android Applications
    Soh, Charlie
    Tan, Hee Beng Kuan
    Arnatovich, Yauhen Leanidavich
    Narayanan, Annamalai
    Wang, Lipo
    2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016), 2016, : 41 - 48
  • [7] LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications
    Qiu, Jun
    Yang, Xuewu
    Wu, Huamao
    Zhou, Yajin
    Li, Jinku
    Ma, Jianfeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2873 - 2889
  • [8] LIBID: Reliable Identification of Obfuscated Third-Party Android Libraries
    Zhang, Jiexin
    Beresford, Alastair R.
    Kolhnann, Stephan A.
    PROCEEDINGS OF THE 28TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS (ISSTA '19), 2019, : 55 - 65
  • [9] Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android
    Wang, Fabo
    Zhang, Yuqing
    Wang, Kai
    Liu, Peng
    Wang, Wenjie
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 458 - 476
  • [10] Stay in your Cage! a sound sandbox for third-party libraries on android
    Wang, Fabo
    Zhang, Yuqing
    Wang, Kai
    Liu, Peng
    Wang, Wenjie
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, 9878 LNCS : 458 - 476