Proceedings of the 5th ACM Conference on Data and Application Security and Privacy 2015
DOI: 10.1145/2699026.2699132
|View full text |Cite
|
Sign up to set email alerts
|

Practical Exploit Generation for Intent Message Vulnerabilities in Android

Abstract: Android's Inter-Component Communication (ICC) mechanism strongly relies on Intent messages. Unfortunately, due to the lack of message origin verification in Intents, application security completely relies on the programmer's skill and attention. In this paper, we advance the state of the art by developing a method to automatically detect potential vulnerabilities and, most importantly, demonstrate whether they can be exploited or not. To this end, we adopt a formal approach to automatically produce malicious p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…DroidSafe (2015) performs information flow analysis to investigate the communication exploits. Gallingani et al (2015) investigated intents related vulnerabilities and demonstrated how they may be exploited to insert the malicious data. Their experiments found 29 out of a total of 64 investigated apps as vulnerable to intent related attacks.…”
Section: Inter-component Communication / Intents Analysismentioning
confidence: 99%
“…DroidSafe (2015) performs information flow analysis to investigate the communication exploits. Gallingani et al (2015) investigated intents related vulnerabilities and demonstrated how they may be exploited to insert the malicious data. Their experiments found 29 out of a total of 64 investigated apps as vulnerable to intent related attacks.…”
Section: Inter-component Communication / Intents Analysismentioning
confidence: 99%
“…Intent messages, when exchanged, can be used by malicious applications to escalate privileges. The inter-component communication mechanizing [20] of Android relies chiefly on Intent messages. Intents are generally used by Android to aid data delivery via asynchronous messages.…”
Section: Intent Messagementioning
confidence: 99%
“…Sadeghi et al [54] worked on inter-app security vulnerabilities using compositional analysis. A good discussion on detection and exploitation of Intent message vulnerabilities using taint analysis is presented in Reference [58]. Lei et al [12] worked on vulnerabilities owing to invocation of services through implicit Intents.…”
Section: Related Workmentioning
confidence: 99%