Analysis of Clickjacking Attacks and An Effective Defense Scheme for Android Devices

被引:0
|
作者
Wu, Longfei [1 ]
Brandt, Benjamin [1 ]
Du, Xiaojiang [1 ]
Ji, Bo [1 ]
机构
[1] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
来源
2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2016年
关键词
Android; security; clickjacking;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smartphones bring users lots of convenience by integrating all useful functions people may need. While users are spending more time on their phones, have they ever questioned of being spoofed by the phone they are interacting with? This paper conducts a thorough study of the mobile clickjacking attacks. We first present how the clickjacking attack works and the key points to remain undiscovered. Then, we evaluate its potential threats by exploring the feasibility of launching clickjacking attacks on various UIs, including system app windows, 3rd-party app windows, and other system UIs. Finally, we propose a system-level defense scheme against clickjacking attacks on Android platform, which requires no user or developer effort and is compatible with existing apps. The performance of the countermeasure is evaluated with extensive experiments. The results show that our scheme can effectively prevent clickjacking attacks with only a minor impact to the system.
引用
收藏
页码:55 / 63
页数:9
相关论文
共 50 条
  • [41] Reputation-based defense scheme against pollution attacks on network coding
    Wang T.
    Cai Y.
    Zhang Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (11): : 2491 - 2499
  • [42] A Robust Defense Scheme to Resist Routing Attacks in Mobile Ad Hoc Networks
    Sun, Hung-Min
    Chen, Chiung-Shun
    Chen, Ci-Lun
    Chen, Yao-Hsin
    2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 58 - 65
  • [43] Is Mutation Analysis Effective at Testing Android Apps?
    Deng, Lin
    Offutt, Jeff
    Samudio, David
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS), 2017, : 86 - 93
  • [44] VADER-RF: a novel scheme for protecting user privacy on android devices
    Verma, Manish
    Nand, Parma
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024,
  • [45] An Effective Authentication Scheme Using DCT for Mobile Devices
    Chang, Chin-Chen
    Lu, Tzu-Chuen
    Zhu, Zhao-Hua
    Tian, Hui
    SYMMETRY-BASEL, 2018, 10 (01):
  • [46] Use of spectral analysis in defense against DoS attacks
    Cheng, CM
    Kung, HT
    Tan, KS
    GLOBECOM'02: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-3, CONFERENCE RECORDS: THE WORLD CONVERGES, 2002, : 2143 - 2148
  • [47] Privacy in VoIP Networks: Flow Analysis Attacks and Defense
    Srivatsa, Mudhakar
    Iyengar, Arun
    Liu, Ling
    Jiang, Hongbo
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (04) : 621 - 633
  • [48] MIC: An Effective Defense Against Word-Level Textual Backdoor Attacks
    Yang, Shufan
    Li, Qianmu
    Lian, Zhichao
    Wang, Pengchuan
    Hou, Jun
    NEURAL INFORMATION PROCESSING, ICONIP 2023, PT VI, 2024, 14452 : 3 - 18
  • [49] Non deterministic caches: a simple and effective defense against side channel attacks
    Keramidas, G.
    Antonopoulos, A.
    Serpanos, D. N.
    Kaxiras, S.
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2008, 12 (03) : 221 - 230
  • [50] An Effective Blockchain-Based Defense Model for Organizations against Vishing Attacks
    Fakieh, Ahlam
    Akremi, Aymen
    APPLIED SCIENCES-BASEL, 2022, 12 (24):