LibGuard: Protecting Sensitive Data In Android Third-Party Libraries From XLDH Attacks

被引:0
|
作者
He, Fannv [1 ]
Wang, Jice [1 ]
Huang, Yuhang [1 ]
Peng, Xiancui [1 ]
Zhang, Yuqing [1 ,2 ]
机构
[1] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
[2] Hainan Univ, Sch Cyberspace Secur, Haikou, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Third-party Library; Attack; Defense; Access control;
D O I
10.1109/ICCCN61486.2024.10637585
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile app vendors/developers extensively integrate third-party libraries into mobile applications. While they enrich the functions of apps, third-party libraries also bring in security risks. It has been widely studied that malicious third-party libraries could collect users' sensitive data from the host apps and the app backend servers. Recent research has reported a new attack vector - malicious libraries strategically target other vendors' library(SDKs) integrated in the same host app to harvest private user data. In this paper, we found two new dimensions of cross library data harvesting(XLDH) attack with serious privacy impacts that start from two new attack surfaces - accessing sensitive fields and accessing sensitive storage. However, the mitigation scheme, significantly, has not been yet studied. To prevent the leaks of sensitive data due to XLDH activities, we first proposed a mitigation scheme - LibGuard, which has been proven to be effective without affecting user's experience on real-world apps.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Survey on Dependency Conflict Problem of Third-party Libraries
    Li S.
    Liu J.
    Wang S.
    Tian H.-X.
    Ye D.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (10): : 4636 - 4660
  • [32] LibKit: Detecting Third-Party Libraries in iOS Apps
    Dominguez-Alvarez, Daniel
    de la Cruz, Alejandro
    Gorla, Alessandra
    Caballero, Juan
    PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 1407 - 1418
  • [33] Understanding Third-party Libraries in Mobile App Analysis
    Wang, Haoyu
    Guo, Yao
    PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), 2017, : 515 - 516
  • [34] Selecting Third-Party Libraries: The Web Developers' Perspective
    Tabassum, Mehreen
    Butt, Wasi Haider
    Muzaffar, Abdul Wahab
    Lashari, Saima Anwar
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2024, 34 (12) : 1857 - 1893
  • [35] A First Look at Android Apps' Third-Party Resources Loading
    Qayyum, Hina
    Salman, Muhammad
    Sentana, I. Wayan Budi
    Duc Linh Giang Nguyen
    Ikram, Muhammad
    Tyson, Gareth
    Kaafar, Mohamed Ali
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 193 - 213
  • [36] The vulnerabilities and solutions of third-party login services in android system
    Dong C.
    Yang C.
    Ma J.-F.
    Zhang J.-W.
    1600, Science Press (39): : 582 - 594
  • [37] Fine Grained Confinement of Untrusted Third-Party Applications in Android
    Pande, Prateek
    Mallaiah, Kurra
    Gandhi, Rishi Kumar
    Medatiya, Amit Kumar
    Srinivasachary, S.
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 372 - 376
  • [38] A methodology for the security evaluation within third-party Android Marketplaces
    Buchanan, William J.
    Chiale, Simone
    Macfarlane, Richard
    DIGITAL INVESTIGATION, 2017, 23 : 88 - 98
  • [39] Keyboard or Keylogger?: a security analysis of third-party keyboards on Android
    Cho, Junsung
    Cho, Geumhwan
    Kim, Hyoungshick
    2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2015, : 173 - 176
  • [40] A Systematic Assessment on Android Third-Party Library Detection Tools
    Zhan, Xian
    Liu, Tianming
    Liu, Yepang
    Liu, Yang
    Li, Li
    Wang, Haoyu
    Luo, Xiapu
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (11) : 4249 - 4273