Detecting and Measuring Misconfigured Manifests in Android Apps

5Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The manifest file of an Android app is crucial for app security as it declares sensitive app configurations, such as access permissions required to access app components. Surprisingly, we noticed a number of widely-used apps (some with over 500 million downloads) containing misconfigurations in their manifest files that can result in severe security issues. This paper presents ManiScope, a tool to automatically detect misconfigurations of manifest files when given an Android APK. The key idea is to build a manifest XML Schema by extracting ManiScope constraints from the manifest documentation with novel domain-aware NLP techniques and rules, and validate manifest files against the schema to detect misconfigurations. We have implemented ManiScope, with which we have identified 609,428 (33.20%) misconfigured Android apps out of 1,853,862 apps from Google Play, and 246,658 (35.64%) misconfigured ones out of 692,106 pre-installed apps from 4,580 Samsung firmwares, respectively. Among them, 84,117 (13.80%) of misconfigured Google Play apps and 56,611 (22.95%) of misconfigured pre-installed apps have various security implications including app defrauding, message spoofing, secret data leakage, and component hijacking.

Cite

CITATION STYLE

APA

Yang, Y., Elsabagh, M., Zuo, C., Johnson, R., Stavrou, A., & Lin, Z. (2022). Detecting and Measuring Misconfigured Manifests in Android Apps. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 3063–3077). Association for Computing Machinery. https://doi.org/10.1145/3548606.3560607

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free