Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security 2017
DOI: 10.1145/3052973.3052998
|View full text |Cite
|
Sign up to set email alerts
|

Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems

Abstract: A majority of today's mobile apps integrate web content of various kinds. Unfortunately, the interactions between app code and web content expose new attack vectors: a malicious app can subvert its embedded web content to steal user secrets; on the other hand, malicious web content can use the privileges of its embedding app to exfiltrate sensitive information such as the user's location and contacts. In this paper, we discuss security weaknesses of the interface between app code and web content through attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…General attacker model: Lastly, it should be emphasized that DROIDCAP currently primarily targets app developers that want to design their apps more defensively by compartmentalizing them or privilege-separating untrusted code. But, like other compartmentalization solutions like [18], [29], [52], [59], [71] our attacker model does not include malicious developers. DROIDCAP by itself cannot prevent malicious or colluding [40], [13] apps, although it prevents unauthorized delegation of capabilities between apps.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…General attacker model: Lastly, it should be emphasized that DROIDCAP currently primarily targets app developers that want to design their apps more defensively by compartmentalizing them or privilege-separating untrusted code. But, like other compartmentalization solutions like [18], [29], [52], [59], [71] our attacker model does not include malicious developers. DROIDCAP by itself cannot prevent malicious or colluding [40], [13] apps, although it prevents unauthorized delegation of capabilities between apps.…”
Section: Discussionmentioning
confidence: 99%
“…The general approach to privilege separation is to execute the library or WebView in a distinct sandbox with different UID and permissions than the host app. AdDroid [52], Ad-Split [59], CompARTist [29], and AFrame [71] implement this approach for ad libs; WIRE [18] privilege-separates WebViews this way; and Layercake [56] supports WebViews and ad libs. In contrast, we leverage in DROIDCAP built-in features for compartmentalizing apps (e.g., process manifest attributes of components) introduce Binder capabilities for efficient, leastprivilege privilege-separation of those compartments.…”
Section: A Android Security Extensionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Other defense approaches, such as WIREframe [17] and HybridGuard [29], provided policy enforcement in WebView to protect app-web bridges. However, both of them only focused on JavaScript code and yet ignored HTML code.…”
Section: Eoe Countermeasure Discussionmentioning
confidence: 99%
“…However, if users need to keep a lot of confidential information, security issues can arise and network overhead can increase. Many research works are being proposed in [1], [2], [3] and [4] which provide a user authentication protocol through session key establishment for the user anonymity in a DCNs. For those attacks that do not protect the secret session key of an attacker, an attacker can falsify the service provider by forging a legal session key.…”
Section: Introductionmentioning
confidence: 99%