2015
DOI: 10.1002/sec.1179
|View full text |Cite
|
Sign up to set email alerts
|

PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

Abstract: An enormous number of applications have been developed for Android in recent years, making it one of the most popular mobile operating systems. However, it is obvious that more vulnerabilities would appear along with the booming amounts of applications. Poorly designed applications may contain security vulnerabilities that can dramatically undermine users' security and privacy. In this paper, we studied a kind of recently reported application vulnerability named confused deputy – a specific type of privilege e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Chen et al [41] manually analysed several OAuth providers for Apps and determined how differences between the Apps and browser environments lead to the OAuth vulnerability. Wu et al [1] proposed a detection method for the confused deputy vulnerability in Android applications based on features of An-droidManifest.xml file and Control Flow Graph (CFG). Fang et al [5] studyed an input validation vulnerability in Android inter-component communication.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Chen et al [41] manually analysed several OAuth providers for Apps and determined how differences between the Apps and browser environments lead to the OAuth vulnerability. Wu et al [1] proposed a detection method for the confused deputy vulnerability in Android applications based on features of An-droidManifest.xml file and Control Flow Graph (CFG). Fang et al [5] studyed an input validation vulnerability in Android inter-component communication.…”
Section: Related Workmentioning
confidence: 99%
“…The security issues of Apps are complex and challenging. Related research on Android security has been proposed, including static [1]- [8] and dynamic [9], [10] methods. Wei et al [11] just analyzed Android vulnerabilities which are assosiated with JavaScript.…”
Section: Introductionmentioning
confidence: 99%
“…The slicing algorithm of APOVD contains two aspects-intra-procedural and inter-procedural slicing, which is based on the program slicer of Indus 7 and has made some improvements on it. Then the generated program slices are used by APOVD to judge the strength of access control in the path from NWP to s. The judgment method is that if there exists a CCJS c in Cs that satisfies one of the following conditions, APOVD considers that there exists adequate access control in the path from NWP to s:…”
Section: Figure 4 Critical Conditional Judgment Statement Searchingmentioning
confidence: 99%
“…A vulnerable and exported component can be visited by the other apps in the same device, which can lead to many types of vulnerabilities, e.g., capability leak [1,2], content provider leakage [3,4], privilege escalation [5,6], confused deputy [7], component hijacking [8,9], intent spoofing [10], etc. But these vulnerabilities can only be exploited locally (the vulnerable app and the malicious app must run in a same device).…”
Section: Related Workmentioning
confidence: 99%
“…As with other state-of-the-art static analysis studies for Android apps (such as Bartel et al [23], Geneiatakis et al [24], Woodpecker [25], Chex [26], and Paddyfrog [27]), our detection tool first translates Dalvik bytecode to an intermediate representation and then constructs an interprocedural control-flow graph (ICFG) (it is also known as a super control-flow graph (sCFG)) representing all possible execution paths of an app, for a given .apk file. Because the accuracy of static analysis relies on the controlflow graph, a precise ICFG needs to be constructed in order to improve the precision of static analysis.…”
Section: Preprocessormentioning
confidence: 99%