Semi-automated discovery of server-based information oversharing vulnerabilities in android applications

15Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

Abstract

Modern applications are often split into separate client and server tiers that communicate via message passing over the network. One well-understood threat to privacy for such applications is the leak- age of sensitive user information either in transit or at the server. In response, an array of defensive techniques have been developed to identify or block unintended or malicious information leakage. However, prior work has primarily considered privacy leaks originating at the client directed at the server, while leakage in the reverse direction - from the server to the client - is comparatively under-studied. The question of whether and to what degree this leakage constitutes a threat remains an open question. We answer this question in the affirmative with Hush, a technique for semi- automatically identifying Server-based In Formation OvershariNg (SIFON) vulnerabilities in multi-tier applications. In particular, the technique detects SIFON vulnerabilities using a heuristic that over- shared sensitive information from server-side APIs will not be displayed by the application's user interface. The technique first per- forms a scalable static program analysis to screen applications for potential vulnerabilities, and then attempts to confirm these candidates as true vulnerabilities with a partially-automated dynamic analysis. Our evaluation over a large corpus of Android applications demonstrates the effectiveness of the technique by discovering several previously-unknown SIFON vulnerabilities in eight applications.

Cite

CITATION STYLE

APA

Koch, W., Chaabane, A., Egele, M., Robertson, W., & Kirda, E. (2017). Semi-automated discovery of server-based information oversharing vulnerabilities in android applications. In ISSTA 2017 - Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis (pp. 147–157). Association for Computing Machinery, Inc. https://doi.org/10.1145/3092703.3092708

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free