2018
DOI: 10.1007/978-3-319-93411-2_4
|View full text |Cite
|
Sign up to set email alerts
|

Honey, I Shrunk Your App Security: The State of Android App Hardening

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Haupert et al [15] evaluated the state of Android app hardening and identified vulnerabilities in a leading Runtime Application Self-Protection (RASP) product. Their work demonstrated the need for continuous improvement in security mechanisms to protect sensitive data from emerging threats.…”
Section: B Sensitive Data Encryptionmentioning
confidence: 99%
“…Haupert et al [15] evaluated the state of Android app hardening and identified vulnerabilities in a leading Runtime Application Self-Protection (RASP) product. Their work demonstrated the need for continuous improvement in security mechanisms to protect sensitive data from emerging threats.…”
Section: B Sensitive Data Encryptionmentioning
confidence: 99%
“…In the ideal case, RASP agents can be deployed in a plug and play manner, requiring only an initial configuration as Haupert et al [12] describes regarding the deployment of Promon SHIELD RASP [22]. In cases where an agent does not require any configuration or a learning phase, attacks are detected using techniques that, e.g., combine taint-tracking with lexical analysis [2] or that monitor common input sinks and output sources for known malicious behavior and signatures [23].…”
Section: Runtime Environment and Binary Instrumentationmentioning
confidence: 99%
“…A banking app is considered insecure and customers should refrain from using it, whenever an attacker succeeds in intercepting user input, such as login credentials or transaction authentication numbers (TANs), often used as second factor of authentication [11,33]. We begin by categorizing the banking apps in our dataset based on the type of user input that is used for interaction: (1) System keyboard events, used for entering user credentials, (2) touch events, that are necessary to implement custom keyboards and (3) camera events, as used to scan a security QR-code or photoTAN.…”
Section: A Interception Of User Inputmentioning
confidence: 99%
“…To this end, many have focused on Android systems for analyzing apps [40][41][42][43], detecting malware and attacks [44][45][46][47], or finding and describing vulnerabilities [48][49][50]-among many other topics. Moreover, jailbreaking or rooting Android devices is discussed both from an offensive [23,51,52] as well as a defensive point of view [11,33,[53][54][55][56]. In this section, we however focus on the iOS platform for which we first discuss attacks on unmodified as well as jailbroken systems.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation