Analysis of Clickjacking Attacks and An Effective Defense Scheme for Android Devices

被引:0
|
作者
Wu, Longfei [1 ]
Brandt, Benjamin [1 ]
Du, Xiaojiang [1 ]
Ji, Bo [1 ]
机构
[1] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
来源
2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2016年
关键词
Android; security; clickjacking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smartphones bring users lots of convenience by integrating all useful functions people may need. While users are spending more time on their phones, have they ever questioned of being spoofed by the phone they are interacting with? This paper conducts a thorough study of the mobile clickjacking attacks. We first present how the clickjacking attack works and the key points to remain undiscovered. Then, we evaluate its potential threats by exploring the feasibility of launching clickjacking attacks on various UIs, including system app windows, 3rd-party app windows, and other system UIs. Finally, we propose a system-level defense scheme against clickjacking attacks on Android platform, which requires no user or developer effort and is compatible with existing apps. The performance of the countermeasure is evaluated with extensive experiments. The results show that our scheme can effectively prevent clickjacking attacks with only a minor impact to the system.
引用
收藏
页码:55 / 63
页数:9
相关论文
共 50 条
  • [1] Stop Deceiving! An Effective Defense Scheme Against Voice Impersonation Attacks on Smart Devices
    Huang, Wenbin
    Tang, Wenjuan
    Jiang, Hongbo
    Luo, Jun
    Zhang, Yaoxue
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (07): : 5304 - 5314
  • [2] ActivityShielder: An Activity Hijacking Defense Scheme for Android Devices
    Yan, Fei
    Li, Yijia
    Zhang, Liqiang
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [3] ScreenStealer: Addressing Screenshot Attacks on Android Devices
    Muzammal, Syeda Mariam
    Shah, Munam Ali
    2016 22ND INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2016, : 337 - 342
  • [4] An Effective Online Scheme for Detecting Android Malware
    Liang, Shuang
    Du, Xiaojiang
    Tan, Chiu C.
    Yu, Wei
    2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [5] Hardware Trojan Attacks in FPGA Devices: Threat Analysis and Effective Countermeasures
    Mal-Sarkar, Sanchita
    Krishna, Aswin
    Ghosh, Anandaroop
    Bhunia, Swarup
    GLSVLSI'14: PROCEEDINGS OF THE 2014 GREAT LAKES SYMPOSIUM ON VLSI, 2014, : 287 - 292
  • [6] GEAAD: generating evasive adversarial attacks against android malware defense
    Naveed Ahmad
    Amjad Saleem Rana
    Hassan Jalil Hadi
    Faisal Bashir Hussain
    Prasun Chakrabarti
    Mohammed Ali Alshara
    Tulika Chakrabarti
    Scientific Reports, 15 (1)
  • [7] An Effective DDoS Defense Scheme for SDN
    Huang, Xueli
    Du, Xiaojiang
    Song, Bin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [8] Multimedia-Based Battery Drain Attacks for Android Devices
    Fiore, Ugo
    Palmieri, Francesco
    Castiglione, Aniello
    Loia, Vincenzo
    De Santis, Alfredo
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
  • [9] An improved defense scheme against attacks on wireless security
    Li, Hua
    Reizvikh, Dimitri
    Lei, Lucy
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 986 - 989
  • [10] A Transparent Encryption Scheme of Video Data for Android Devices\
    Pang, Pengfei
    Aourra, Khaled
    Xue, Yuan
    Li, YuanZhang
    Zhang, QuanXin
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 817 - 822