Vulnerabilities in Android webview objects: Still not the end!

被引:4
|
作者
El-Zawawy, Mohamed A. [1 ]
Losiouk, Eleonora [2 ]
Conti, Mauro [2 ]
机构
[1] Cairo Univ, Fac Sci, Dept Math, Giza 12613, Egypt
[2] Univ Padua, Dept Math, Padua, Italy
关键词
Android security; Taint analysis; Hybrid applications; Web view; !text type='Java']Java[!/text] script interfaces; Web view client;
D O I
10.1016/j.cose.2021.102395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WebView objects allow Android apps to render web content in the app context. More specifically, in Android hybrid apps (i.e., those having both Android code and web code) the web content can interact with the underlying Android framework through Java interfaces and WebViewClient objects. Thus, while rendering web content a hybrid app can execute malicious Javascript code that can access the sensitive data on the device, bypassing the sandbox model usually adopted by standalone browsers. Researchers already analyzed the security issues of WebView objects, by focusing on Javascript interfaces. However, we believe that there are other aspects related to the rendering of web content in Android apps, such as WebViewClient objects, that could lead to security issues. In this paper, we introduce three new types of vulnerabilities related to WebView, that expose new attack surfaces concerning the most well-known vulnerability related to JavaScript interfaces. To detect these new types of vulnerabilities, we designed WebV Sec, a static analysis system that relies on a set of custom inference rules, heuristically formalized. By designing WebV Sec to detect also the vulnerability already described in the state-of-art, we were able to compare WebV Sec with BabelView on a set of 2000 applications. BabelView was found not able to detect our new three types of vulnerabilities and also less precise and efficient in detecting the already known vulnerability. In particular, over the 2000 analyzed apps, WebV Sec and BabelView identified 48 and 18 vulnerable apps, respectively. Among those, WebV Sec found 20 apps having a specific type of vulnerabilities and 36 apps having another type of vulnerabilities, while BabelView found 11 and 0 apps, respectively. In terms of efficiency, WebV Sec took 27.16 hours to analyze the whole set of 2000 applications against the 63.64 hours required by BabelView. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] A Survey Paper on Vulnerabilities in Android OS and Security of Android Devices
    Meshram, P. D.
    Thool, R. C.
    2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 174 - 178
  • [22] Demand-driven Information Flow Analysis of WebView in Android Hybrid Apps
    Tiwari, Abhishek
    Prakash, Jyoti
    Hammer, Christian
    2023 IEEE 34TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, ISSRE, 2023, : 415 - 426
  • [23] Understanding the Evolution of Android App Vulnerabilities
    Gao, Jun
    Li, Li
    Kong, Pingfan
    Bissyande, Tegawende F.
    Klein, Jacques
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (01) : 212 - 230
  • [24] Two Vulnerabilities in Android OS Kernel
    Hei, Xiali
    Du, Xiaojiang
    Lin, Shan
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013, : 6123 - 6127
  • [25] Colluded Applications Vulnerabilities in Android Devices
    Khokhlov, Igor
    Reznik, Leon
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 462 - 469
  • [26] WebView未授权调用Android硬件漏洞的发现与防护
    黄钰翔
    李永飞
    贺骅
    牛慧杰
    网络安全技术与应用, 2024, (06) : 49 - 53
  • [27] MUSEUMS, ARCHAEOLOGICAL OBJECTS AND INDIGENOUS COMMUNITIES: THERE IS STILL A LIGHT AT THE END OF THE TUNNEL
    Amaro, Goncalo de Carvalho
    CONIMBRIGA-REVISTA DE ARQUEOLOGIA, 2019, 58 : 367 - 395
  • [28] Hardening the OAuth-WebView Implementations in Android Applications By Re-factoring the Chromium Library
    Mohsen, Fadi
    Shehab, Mohamed
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 196 - 205
  • [29] A Survey of Security Vulnerabilities in Android Automotive Apps
    Moiz, Abdul
    Alalfi, Manar H.
    3RD INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2022), 2022, : 17 - 24
  • [30] Detection of SQLite Database Vulnerabilities in Android Apps
    Jain, Vineeta
    Gaur, M. S.
    Laxmi, Vijay
    Mosbah, Mohamed
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 521 - 531