Vulnerabilities in Android webview objects: Still not the end!

被引:4
|
作者
El-Zawawy, Mohamed A. [1 ]
Losiouk, Eleonora [2 ]
Conti, Mauro [2 ]
机构
[1] Cairo Univ, Fac Sci, Dept Math, Giza 12613, Egypt
[2] Univ Padua, Dept Math, Padua, Italy
关键词
Android security; Taint analysis; Hybrid applications; Web view; !text type='Java']Java[!/text] script interfaces; Web view client;
D O I
10.1016/j.cose.2021.102395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WebView objects allow Android apps to render web content in the app context. More specifically, in Android hybrid apps (i.e., those having both Android code and web code) the web content can interact with the underlying Android framework through Java interfaces and WebViewClient objects. Thus, while rendering web content a hybrid app can execute malicious Javascript code that can access the sensitive data on the device, bypassing the sandbox model usually adopted by standalone browsers. Researchers already analyzed the security issues of WebView objects, by focusing on Javascript interfaces. However, we believe that there are other aspects related to the rendering of web content in Android apps, such as WebViewClient objects, that could lead to security issues. In this paper, we introduce three new types of vulnerabilities related to WebView, that expose new attack surfaces concerning the most well-known vulnerability related to JavaScript interfaces. To detect these new types of vulnerabilities, we designed WebV Sec, a static analysis system that relies on a set of custom inference rules, heuristically formalized. By designing WebV Sec to detect also the vulnerability already described in the state-of-art, we were able to compare WebV Sec with BabelView on a set of 2000 applications. BabelView was found not able to detect our new three types of vulnerabilities and also less precise and efficient in detecting the already known vulnerability. In particular, over the 2000 analyzed apps, WebV Sec and BabelView identified 48 and 18 vulnerable apps, respectively. Among those, WebV Sec found 20 apps having a specific type of vulnerabilities and 36 apps having another type of vulnerabilities, while BabelView found 11 and 0 apps, respectively. In terms of efficiency, WebV Sec took 27.16 hours to analyze the whole set of 2000 applications against the 63.64 hours required by BabelView. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Bifocals: Analyzing WebView Vulnerabilities in Android Applications
    Chin, Erika
    Wagner, David
    INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 138 - 159
  • [2] Access Control to Prevent Attacks Exploiting Vulnerabilities of WebView in Android OS
    Yu, Jing
    Yamauchi, Toshihiro
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1628 - 1633
  • [3] Access Control to Prevent Malicious Java']JavaScript Code Exploiting Vulnerabilities of WebView in Android OS
    Yu, Jing
    Yamauchi, Toshihiro
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (04): : 807 - 811
  • [4] Attacks on WebView in the Android System.
    Luo, Tongbo
    Hao, Hao
    Du, Wenliang
    Wang, Yifei
    Yin, Heng
    27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 343 - 352
  • [5] Detection of Vulnerabilities Caused by WebView Exploitation in Smartphone
    Hidhaya, S. Fouzul
    Geetha, Angelina
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 357 - 364
  • [6] Android应用WebView漏洞的浅谈
    赵淑贤
    未春凤
    张雪莲
    计算机产品与流通, 2019, (03) : 148 - 148
  • [7] Recommendations for Webview Based Mobile Applications on Android
    Hazarika, Pinku
    Raj, Rahul C. P.
    Tolety, Seshubabu
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1589 - 1592
  • [8] An Automated Detection and Verification Method for WebView Component Vulnerabilities
    Wang J.-J.
    Liu J.-X.
    Ma Y.-F.
    Shao S.
    Zhang P.-H.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2020, 40 (02): : 169 - 174
  • [9] A Low Overhead Prevention of Android WebView Abuse Attacks
    Jamsheed, K.
    Praveen, K.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 530 - 537
  • [10] ωTEST: WebView-Oriented Testing for Android Applications
    Hu, Jiajun
    Wei, Lili
    Liu, Yepang
    Cheung, Shing-Chi
    PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 992 - 1004