LibGuard: Protecting Sensitive Data In Android Third-Party Libraries From XLDH Attacks

被引:0
|
作者
He, Fannv [1 ]
Wang, Jice [1 ]
Huang, Yuhang [1 ]
Peng, Xiancui [1 ]
Zhang, Yuqing [1 ,2 ]
机构
[1] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
[2] Hainan Univ, Sch Cyberspace Secur, Haikou, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Third-party Library; Attack; Defense; Access control;
D O I
10.1109/ICCCN61486.2024.10637585
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile app vendors/developers extensively integrate third-party libraries into mobile applications. While they enrich the functions of apps, third-party libraries also bring in security risks. It has been widely studied that malicious third-party libraries could collect users' sensitive data from the host apps and the app backend servers. Recent research has reported a new attack vector - malicious libraries strategically target other vendors' library(SDKs) integrated in the same host app to harvest private user data. In this paper, we found two new dimensions of cross library data harvesting(XLDH) attack with serious privacy impacts that start from two new attack surfaces - accessing sensitive fields and accessing sensitive storage. However, the mitigation scheme, significantly, has not been yet studied. To prevent the leaks of sensitive data due to XLDH activities, we first proposed a mitigation scheme - LibGuard, which has been proven to be effective without affecting user's experience on real-world apps.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Selecting third-party libraries: the data scientist's perspective
    Nadi, Sarah
    Sakr, Nourhan
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (01)
  • [22] Selecting third-party libraries: the data scientist’s perspective
    Sarah Nadi
    Nourhan Sakr
    Empirical Software Engineering, 2023, 28
  • [23] Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications
    Duan, Yue
    Gao, Lian
    Hu, Jie
    Yin, Heng
    PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 277 - 292
  • [24] APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps
    Li, Bodong
    Zhang, Yuanyuan
    Li, Juanru
    Feng, Runhan
    Gu, Dawu
    2019 IEEE 26TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER), 2019, : 344 - 354
  • [25] ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications
    Zhan, Xian
    Fan, Lingling
    Chen, Sen
    We, Feng
    Liu, Tianming
    Luo, Xiapu
    Liu, Yang
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2021), 2021, : 1695 - 1707
  • [26] Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering
    Huang, Jianjun
    Xue, Bo
    Jiang, Jiasheng
    You, Wei
    Liang, Bin
    Wu, Jingzheng
    Wu, Yanjun
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2023, 49 (04) : 2272 - 2284
  • [27] Selecting Third-Party Libraries: The Practitioners' Perspective
    Vargas, Enrique Larios
    Aniche, Mauricio
    Treude, Christoph
    Bruntink, Magiel
    Gousios, Georgios
    PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, : 245 - 256
  • [28] Risks of third-party data
    Schneier, B
    COMMUNICATIONS OF THE ACM, 2005, 48 (05) : 136 - 136
  • [29] Identifying Vulnerable Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries
    Chen, Tianyu
    Li, Lin
    Shan, Bingjie
    Liang, Guangtai
    Li, Ding
    Wang, Qianxiang
    Xie, Tao
    arXiv, 2023,
  • [30] Adoption of Third-party Libraries in Mobile Apps: A Case Study on Open-source Android Applications
    Polese, Aidan
    Hassan, Safwat
    Tian, Yuan
    9TH IEEE/ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT 2022, 2022, : 125 - 135