Vulnerabilities in Android webview objects: Still not the end!

被引:4
|
作者
El-Zawawy, Mohamed A. [1 ]
Losiouk, Eleonora [2 ]
Conti, Mauro [2 ]
机构
[1] Cairo Univ, Fac Sci, Dept Math, Giza 12613, Egypt
[2] Univ Padua, Dept Math, Padua, Italy
关键词
Android security; Taint analysis; Hybrid applications; Web view; !text type='Java']Java[!/text] script interfaces; Web view client;
D O I
10.1016/j.cose.2021.102395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WebView objects allow Android apps to render web content in the app context. More specifically, in Android hybrid apps (i.e., those having both Android code and web code) the web content can interact with the underlying Android framework through Java interfaces and WebViewClient objects. Thus, while rendering web content a hybrid app can execute malicious Javascript code that can access the sensitive data on the device, bypassing the sandbox model usually adopted by standalone browsers. Researchers already analyzed the security issues of WebView objects, by focusing on Javascript interfaces. However, we believe that there are other aspects related to the rendering of web content in Android apps, such as WebViewClient objects, that could lead to security issues. In this paper, we introduce three new types of vulnerabilities related to WebView, that expose new attack surfaces concerning the most well-known vulnerability related to JavaScript interfaces. To detect these new types of vulnerabilities, we designed WebV Sec, a static analysis system that relies on a set of custom inference rules, heuristically formalized. By designing WebV Sec to detect also the vulnerability already described in the state-of-art, we were able to compare WebV Sec with BabelView on a set of 2000 applications. BabelView was found not able to detect our new three types of vulnerabilities and also less precise and efficient in detecting the already known vulnerability. In particular, over the 2000 analyzed apps, WebV Sec and BabelView identified 48 and 18 vulnerable apps, respectively. Among those, WebV Sec found 20 apps having a specific type of vulnerabilities and 36 apps having another type of vulnerabilities, while BabelView found 11 and 0 apps, respectively. In terms of efficiency, WebV Sec took 27.16 hours to analyze the whole set of 2000 applications against the 63.64 hours required by BabelView. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] An Empirical Study on Android-related Vulnerabilities
    Linares-Vasquez, Mario
    Bavota, Gabriele
    Escobar-Velasquez, Camilo
    2017 IEEE/ACM 14TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2017), 2017, : 2 - 13
  • [32] VULHUNTER: TOWARD DISCOVERING VULNERABILITIES IN ANDROID APPLICATIONS
    Qian, Chenxiong
    Luo, Xiapu
    Le, Yu
    Gu, Guofei
    IEEE MICRO, 2015, 35 (01) : 44 - 53
  • [33] A Study of Android Security Vulnerabilities and Their Future Prospects
    Alsumayt, Albandari
    Elbeh, Heba
    Elkawkagy, Mohamed
    Alfawaer, Zeyad
    Alghamedy, Fatemah H.
    Alshammari, Majid
    Aljameel, Sumayh S.
    Albassam, Sarah
    Alghareeb, Shahad
    Alamoudi, Khadijah
    HighTech and Innovation Journal, 2024, 5 (03): : 854 - 869
  • [34] Static Detection of Filesystem Vulnerabilities in Android Systems
    Lee, Yu-Tsung
    Vijayakumar, Hayawardh
    Qian, Zhiyun
    Jaeger, Trent
    arXiv,
  • [35] How We Found These Vulnerabilities in Android Applications
    Ma, Bin
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 399 - 406
  • [36] Messaging Attacks on Android: Vulnerabilities and Intrusion Detection
    Hamandi, Khodor
    Salman, Alaa
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [37] Android application vulnerabilities static mining technology
    Tang J.
    Liu J.
    Li R.
    Li W.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2016, 44 : 20 - 24
  • [38] Unveiling the Security Vulnerabilities in Android Operating System
    Renjith, G.
    Aji, S.
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 89 - 100
  • [39] A Survey of Vulnerabilities Mining Based on Android System
    Wang, Xiao-xi
    Wu, Xian-da
    Zhang, Xiao-min
    Li, Hao
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, MACHINERY AND MATERIALS (IIMM 2015), 2015, : 355 - 359
  • [40] Memory Corruption Vulnerabilities Detection for Android Binary Software
    Zhang, Bin
    Wu, Bo
    Feng, Chao
    Tang, Chaojing
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2015, : 16 - 20