Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services 2019
DOI: 10.1145/3307334.3326094
|View full text |Cite
|
Sign up to set email alerts
|

Understanding and Detecting Overlay-based Android Malware at Market Scales

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…The sensitive system services that do have the signature permissions then check such settings to determine whether a requesting app is entitled to have access to such sensitive permission-protected information. We also note that not only is it possible to access information protected by these signature-level permissions, but that many real-world apps (both benign and malicious) currently use them [20], [35], [5]. Thus, since third-party applications may require some of these permissions, we believe it is appropriate to consider them within our threat model.…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The sensitive system services that do have the signature permissions then check such settings to determine whether a requesting app is entitled to have access to such sensitive permission-protected information. We also note that not only is it possible to access information protected by these signature-level permissions, but that many real-world apps (both benign and malicious) currently use them [20], [35], [5]. Thus, since third-party applications may require some of these permissions, we believe it is appropriate to consider them within our threat model.…”
Section: Threat Modelmentioning
confidence: 99%
“…Hence, the only available attack vector for the malware is to rely on the APIs protected by the well known BIND_ACCESSIBILITY_SERVICE permission (a11y) [12]. As it is possible to see, some sophisticated malware like Bankosy, Cepsohord, and MysteryBot started moving from the a11y towards exploiting vulnerable APIs protected by the PACKAGE_USAGE_STATS [20], [35], [5]. This transition might also be forced by the fact that Google is going to remove all the applications using the BIND_ACCESSIBILITY_SERVICE permission for anything except helping disabled users [8].…”
Section: A Peculiarity Of Phishing Applicationsmentioning
confidence: 99%
“…An overlay is a feature of user interfaces: A mobile app is able to place an additional view layer over another app's view layer [16], [17]. With the overlay feature, interacting with multiple opened apps at the same time shall become more comfortable for the user [18]. However, an overlay is able to intercept user input such as key events that was originally intended for the underlying view (other app).…”
Section: ) Clickjacking: Tabjackingmentioning
confidence: 99%
“…It is worth noting that the trojan is not scanning the banking app's view to copy its appearance. In fact, the view appearance was predefined during trojan creation [18].…”
Section: ) Clickjacking: Tabjackingmentioning
confidence: 99%
See 1 more Smart Citation