Vulnerabilities in Android webview objects: Still not the end!

被引:4
|
作者
El-Zawawy, Mohamed A. [1 ]
Losiouk, Eleonora [2 ]
Conti, Mauro [2 ]
机构
[1] Cairo Univ, Fac Sci, Dept Math, Giza 12613, Egypt
[2] Univ Padua, Dept Math, Padua, Italy
关键词
Android security; Taint analysis; Hybrid applications; Web view; !text type='Java']Java[!/text] script interfaces; Web view client;
D O I
10.1016/j.cose.2021.102395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
WebView objects allow Android apps to render web content in the app context. More specifically, in Android hybrid apps (i.e., those having both Android code and web code) the web content can interact with the underlying Android framework through Java interfaces and WebViewClient objects. Thus, while rendering web content a hybrid app can execute malicious Javascript code that can access the sensitive data on the device, bypassing the sandbox model usually adopted by standalone browsers. Researchers already analyzed the security issues of WebView objects, by focusing on Javascript interfaces. However, we believe that there are other aspects related to the rendering of web content in Android apps, such as WebViewClient objects, that could lead to security issues. In this paper, we introduce three new types of vulnerabilities related to WebView, that expose new attack surfaces concerning the most well-known vulnerability related to JavaScript interfaces. To detect these new types of vulnerabilities, we designed WebV Sec, a static analysis system that relies on a set of custom inference rules, heuristically formalized. By designing WebV Sec to detect also the vulnerability already described in the state-of-art, we were able to compare WebV Sec with BabelView on a set of 2000 applications. BabelView was found not able to detect our new three types of vulnerabilities and also less precise and efficient in detecting the already known vulnerability. In particular, over the 2000 analyzed apps, WebV Sec and BabelView identified 48 and 18 vulnerable apps, respectively. Among those, WebV Sec found 20 apps having a specific type of vulnerabilities and 36 apps having another type of vulnerabilities, while BabelView found 11 and 0 apps, respectively. In terms of efficiency, WebV Sec took 27.16 hours to analyze the whole set of 2000 applications against the 63.64 hours required by BabelView. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably
    Liang, Hongliang
    Yang, Tianqi
    Jiang, Lin
    Chen, Yixiu
    Xie, Zhuosi
    2019 26TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC), 2019, : 434 - 441
  • [42] Android Mobile Applications Vulnerabilities and Prevention Methods: A Review
    Abdullah, Hilmi
    Zeebaree, Subhi R. M.
    PROCEEDING OF 2021 2ND INFORMATION TECHNOLOGY TO ENHANCE E-LEARNING AND OTHER APPLICATION (IT-ELA 2021), 2021, : 148 - 153
  • [43] Vulnerabilities of Android OS-Based Telematics System
    Jo, Hyo Jin
    Choi, Wonsuk
    Na, Seoung Yeop
    Woo, Samuel
    Lee, Dong Hoon
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 92 (04) : 1511 - 1530
  • [44] The Android OS stack and its vulnerabilities: an empirical study
    Alejandro Mazuera-Rozo
    Jairo Bautista-Mora
    Mario Linares-Vásquez
    Sandra Rueda
    Gabriele Bavota
    Empirical Software Engineering, 2019, 24 : 2056 - 2101
  • [45] Detecting Software Vulnerabilities in Android Using Static Analysis
    Dhaya, R.
    Poongodi, M.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 915 - 918
  • [46] ActivityFuzzer: Detecting the Security Vulnerabilities of Android Activity Components
    Wang, Yongke
    Zhuge, Jianwei
    Sun, Donghong
    Liu, Wu
    Li, Fenghua
    2ND INTERNATIONAL CONFERENCE ON SIMULATION AND MODELING METHODOLOGIES, TECHNOLOGIES AND APPLICATIONS (SMTA 2015), 2015, : 262 - 267
  • [47] Towards Understanding Android System Vulnerabilities: Techniques and Insights
    Wu, Daoyuan
    Gao, Debin
    Cheng, Eric K. T.
    Cao, Yichen
    Jiang, Jintao
    Deng, Robert H.
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 295 - 306
  • [48] Detecting vulnerabilities in Android applications using event sequences
    Ratliff, Zachary B.
    Kuhn, D. Richard
    Ragsdale, Daniel J.
    2019 IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2019), 2019, : 159 - 166
  • [49] The Android OS stack and its vulnerabilities: an empirical study
    Mazuera-Rozo, Alejandro
    Bautista-Mora, Jairo
    Linares-Vasquez, Mario
    Rueda, Sandra
    Bavota, Gabriele
    EMPIRICAL SOFTWARE ENGINEERING, 2019, 24 (04) : 2056 - 2101
  • [50] Research of discovering vulnerabilities of NFC applications on Android platform
    Wang, Zhi-Qiang
    Liu, Qi-Xu
    Zhang, Yu-Qing
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 117 - 123