2014
DOI: 10.1007/978-3-319-13257-0_20
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Android Browser Apps for file:// Vulnerabilities

Abstract: Abstract. Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtain users' private files, such as cookies, bookmarks, and browsing histories. We design an automated system to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
33
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
3

Relationship

2
7

Authors

Journals

citations
Cited by 23 publications
(33 citation statements)
references
References 17 publications
0
33
0
Order By: Relevance
“…Numerous attack forms have been found and studied by the researchers, such as excess authorization [11], file-based crosszone scripting [18], touchjacking [19], unauthorized origin crossing [20], etc. WebView vulnerabilities are mainly caused by the insecure API invocations from the JS code to the Java or native code in an app.…”
Section: Related Workmentioning
confidence: 99%
“…Numerous attack forms have been found and studied by the researchers, such as excess authorization [11], file-based crosszone scripting [18], touchjacking [19], unauthorized origin crossing [20], etc. WebView vulnerabilities are mainly caused by the insecure API invocations from the JS code to the Java or native code in an app.…”
Section: Related Workmentioning
confidence: 99%
“…Dynamic analysis has been used to analyze mobile apps with respect to privacy [8], security [22], [27], performance [24], energy consumption [10], [19], [20] and bugs [1], [12], [14], [16], [23]. Several frameworks for large-scale dynamic analysis for mobile apps [4], [11] and automatic test frameworks running in the cloud [17], [25] have emerged.…”
Section: Related Workmentioning
confidence: 99%
“…To the best of our knowledge, the local resource oracle and the inference attacks it enables have never been reported before. These indirect attacks work regardless of how the same origin policy is implemented in WebView, including the latest implementations that have fixed the vulnerability described in [53].…”
Section: Related Workmentioning
confidence: 99%
“…Wu and Chang showed how to steal files from mobile devices by exploiting how mobile browsers interpret SOP for file-scheme origins [53], in particular, the fact that old versions of Android's WebView treat all file-scheme URIs as the same origin. This attack is similar to the direct filereading vulnerability in AdMarvel described in Section IV-B.…”
Section: Related Workmentioning
confidence: 99%