Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android

18Citations
Citations of this article
88Readers
Mendeley users who have this article in their library.

Abstract

Uninstalling apps from mobile devices is among the most common user practices on smartphones. It may sound trivial, but the entire process involves multiple system components coordinating to remove the data belonging to the uninstalled app. Despite its frequency and complexity, little has been done to understand the security risks in the app’s uninstallation process. In this project, we have conducted the first systematic analysis of Android’s data cleanup mechanism during the app’s uninstallation process. Our analysis reveals that data residues are pervasive in the system after apps are uninstalled. For each identified data residue instance, we have formulated hypotheses and designed experiments to see whether it can be exploited to compromise the system security. The results are surprising: we have found 12 instances of vulnerabilities caused by data residues. By exploiting them, adversaries can steal user’s online-account credentials, access other app’s private data, escalate privileges, eavesdrop on user’s keystrokes, etc. We call these attacks the data residue attacks. To evaluate the real-world impact of the attacks, we have conducted an analysis on the top 100 apps in each of the 27 categories from GooglePlay. The result shows that a large portion of the apps can be the target of the data residue attacks. We have further evaluated the effectiveness of popular app markets (GooglePlay, Amazon appstore and Samsung appstore) in preventing our attacking apps from reaching their markets. Moreover, we have studied the data residue attacks on 10 devices from different vendors to see how vendor customization can affect our attacks. Google has acknowledged all our findings, and is working with us to get the problems fixed.

References Powered by Scopus

Android permissions demystified

1125Citations
N/AReaders
Get full text

FLOWDROID: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps

954Citations
N/AReaders
Get full text

On lightweight mobile phone application certification

829Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Static analysis of android apps: A systematic literature review

261Citations
N/AReaders
Get full text

ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms

243Citations
N/AReaders
Get full text

TaintART: A practical multi-level information-flow tracking system for Android RunTime

149Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Zhang, X., Ying, K., Aafer, Y., Qiu, Z., & Du, W. (2016). Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society. https://doi.org/10.14722/ndss.2016.23061

Readers over time

‘15‘16‘17‘18‘19‘20‘21‘23‘2406121824

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 51

80%

Researcher 8

13%

Professor / Associate Prof. 3

5%

Lecturer / Post doc 2

3%

Readers' Discipline

Tooltip

Computer Science 62

85%

Engineering 7

10%

Social Sciences 3

4%

Physics and Astronomy 1

1%

Save time finding and organizing research with Mendeley

Sign up for free
0