Direct Resource Hijacking in Android is Still Dangerous

IEEE Internet Computing(2018)

引用 0|浏览6
暂无评分
摘要
Android provides flexible inter-application (or app) communication by exporting the components of one app to others. Each app can define customized permissions to control the access from others to its exposed components. However, an attacker can easily access the exported components and private app information by evading permission check in Android. In this article, we present a new attack called direct resource hijacking attack by hijacking exported components or permissions on components. We find that among top 230 popular apps 53 apps are vulnerable to this attack. To tackle this vulnerability, we propose a fine-grained resource access control framework in Android and introduce a certificate-augmented resource naming mechanism. With this, malicious apps cannot hijack a victim apps permissions to steal its data, or hijack a victim apps components to receive its data. We hope our scheme will shed light on a new design of resource protection in Android.
更多
查看译文
关键词
software,software engineering,operating systems,security and privacy protection,access controls,android,information leakage
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要