Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit

4Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Online content sharing is a widely used feature in Android apps. In this paper, we observe a new Fake-Share attack that adversaries can abuse existing content sharing services to manipulate the displayed source of shared content to bypass the content review of targeted Online Social Apps (OSAs) and induce users to click on the shared fraudulent content. We show that seven popular content-sharing services (including WeChat, AliPay, and KakaoTalk) are vulnerable to such an attack. To detect this kind of attack and explore whether adversaries have leveraged it in the wild, we propose DeFash, a multi-granularity detection tool including static analysis and dynamic verification. The extensive in-the-lab and in-the-wild experiments demonstrate that DeFash is effective in detecting such attacks. We have identified 51 real-world apps involved in Fake-Share attacks. We have further harvested over 24K Sharing Identification Information (SIIs) that can be abused by attackers. It is hence urgent for our community to take actions to detect and mitigate this kind of attack.

Cite

CITATION STYLE

APA

Xu, G., Li, S., Zhou, H., Liu, S., Tang, Y., Li, L., … Wang, H. (2022). Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit. In WWW 2022 - Proceedings of the ACM Web Conference 2022 (pp. 3327–3335). Association for Computing Machinery, Inc. https://doi.org/10.1145/3485447.3512151

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free