Colluded Applications Vulnerabilities in Android Devices

被引:2
|
作者
Khokhlov, Igor [1 ]
Reznik, Leon [1 ]
机构
[1] Rochester Inst Technol, Rochester, NY 14623 USA
来源
2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI | 2017年
基金
美国国家科学基金会;
关键词
vulnerability; colluded applications; Android devices;
D O I
10.1109/DASC-PICom-DataCom-CyberSciTec.2017.89
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern smartphones may store user's very private information whose leakage may cause bad or even dramatic privacy and security violations. In this paper, we describe in details possible vulnerabilities whose exploitation can lead to a privacy leakage. These vulnerabilities depend on communication between colluded applications, which can employ either an overt or covert mode communication to bypass permission security mechanisms of the Android OS. Covert communication can even conceal the very fact of their communication act to help avoid a detection by anti-malware software. In the reported empirical study, we simulated various cases of both attack types on the Android device. By employing Android system monitor tools, signals characterizing applications allocated memory consumption and overall memory consumption as well as a CPU utilization have been recorded and analyzed over periods of time that included various attacks and only normal situation. The samples of recorded signals are presented. In these signals, distinctive patterns that can be used for the detection of colluded application attacks were identified.
引用
收藏
页码:462 / 469
页数:8
相关论文
共 50 条
  • [21] POSTER: Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning
    Senanayake, Janaka
    Kalutarage, Harsha
    Al-Kadri, Mhd Omar
    Petrovski, Andrei
    Piras, Luca
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 1255 - 1257
  • [22] SYSTEM SIGNALS MONITORING AND PROCESSING FOR COLLUDED APPLICATION ATTACKS DETECTION IN ANDROID OS
    Khokhlov, Igor
    Perez, Michael
    Reznik, Leon
    2019 IEEE WESTERN NEW YORK IMAGE AND SIGNAL PROCESSING WORKSHOP (WNYISPW), 2019,
  • [23] Towards the optimal execution of Renderscript applications in Android devices
    Acosta, Alejandro
    Almeida, Francisco
    SIMULATION MODELLING PRACTICE AND THEORY, 2015, 58 : 55 - 64
  • [24] A review of cloned mobile malware applications for android devices
    Baykara, Muhammet
    Colak, Eren
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 394 - 398
  • [25] Forensic Analysis of Dating Applications on Android and iOS Devices
    Hutchinson, Shinelle
    Shantaram, Neesha
    Karabiyik, Umit
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 837 - 848
  • [26] TEEzz: Fuzzing Trusted Applications on COTS Android Devices
    Busch, Marcel
    Machiry, Aravind
    Spensky, Chad
    Vigna, Giovanni
    Kruegel, Christopher
    Payer, Mathias
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1204 - 1219
  • [27] Android Applications Repackaging Detection Techniques for Smartphone Devices
    Rastogi, Sajal
    Bhushan, Kriti
    Gupta, B. B.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 26 - 32
  • [28] Automated forensic analysis of mobile applications on Android devices
    Lin, Xiaodong
    Chen, Ting
    Zhu, Tong
    Yang, Kun
    Wei, Fengguo
    DIGITAL INVESTIGATION, 2018, 26 : S59 - S66
  • [29] DESIGN OF DATABASE APPLICATIONS IN MOBILE DEVICES WITH OS ANDROID
    Petrucha, Jindrich
    Jurca, Robert
    Bartonek, Dalibor
    INFORMATICS, GEOINFORMATICS AND REMOTE SENSING CONFERENCE PROCEEDINGS, SGEM 2016, VOL I, 2016, : 173 - 180
  • [30] Understanding the Evolution of Android App Vulnerabilities
    Gao, Jun
    Li, Li
    Kong, Pingfan
    Bissyande, Tegawende F.
    Klein, Jacques
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (01) : 212 - 230