Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems

Claudio Marforio, Aurélien Francillon, Srdjan Capkun
{"title":"Application Collusion Attack on the Permission-Based Security Model and its Implications for Modern Smartphone Systems","authors":"Claudio Marforio, Aurélien Francillon, Srdjan Capkun","doi":"10.3929/ETHZ-A-006936208","DOIUrl":null,"url":null,"abstract":"We show that the way in which permission-based mechanisms are used on today's mobile platforms enables attacks by colluding applications that communicate over overt and covert communication channels. These attacks allow applications to indirectly execute operations that those applications, based on their declared permissions, should not be able to execute. Example operations include disclosure of users private data (e.g., phone book and calendar entries) to remote parties by applications that do not have direct access to such data or cannot directly establish remote connections. We further show that on today’s mobile platforms users are not made aware of possible implications of application collusion--quite the contrary--users are implicitly lead to believe that by approving the installation of each application independently, based on its declared permissions, they can limit the damage that an application can cause. In this work, we show that this is not correct and that application permissions should be displayed to the users differently (e.g., in their aggregated form), reflecting their actual implications. We demonstrate the practicality of application collusion attacks by implementing several applications and example covert channels on an Android platform and an example channel on a Windows Phone 7 platform. We study free applications from the Android market and show that the potential for application collusion is significant. Finally, we discuss countermeasures that can be used to mitigate these attacks.","PeriodicalId":10841,"journal":{"name":"CTIT technical reports series","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2010-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"98","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"CTIT technical reports series","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3929/ETHZ-A-006936208","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 98

Abstract

We show that the way in which permission-based mechanisms are used on today's mobile platforms enables attacks by colluding applications that communicate over overt and covert communication channels. These attacks allow applications to indirectly execute operations that those applications, based on their declared permissions, should not be able to execute. Example operations include disclosure of users private data (e.g., phone book and calendar entries) to remote parties by applications that do not have direct access to such data or cannot directly establish remote connections. We further show that on today’s mobile platforms users are not made aware of possible implications of application collusion--quite the contrary--users are implicitly lead to believe that by approving the installation of each application independently, based on its declared permissions, they can limit the damage that an application can cause. In this work, we show that this is not correct and that application permissions should be displayed to the users differently (e.g., in their aggregated form), reflecting their actual implications. We demonstrate the practicality of application collusion attacks by implementing several applications and example covert channels on an Android platform and an example channel on a Windows Phone 7 platform. We study free applications from the Android market and show that the potential for application collusion is significant. Finally, we discuss countermeasures that can be used to mitigate these attacks.
基于权限安全模型的应用合谋攻击及其对现代智能手机系统的启示
我们展示了在当今的移动平台上使用基于许可的机制的方式,可以通过通过公开和隐蔽的通信通道进行通信的串通应用程序来实现攻击。这些攻击允许应用程序间接执行这些应用程序根据其声明的权限不应该执行的操作。示例操作包括通过不能直接访问这些数据或不能直接建立远程连接的应用程序向远程方披露用户私人数据(例如,电话簿和日历条目)。我们进一步表明,在今天的移动平台上,用户没有意识到应用程序合谋的可能影响——恰恰相反——用户被隐含地引导相信,通过基于其声明的权限独立批准每个应用程序的安装,他们可以限制应用程序可能造成的损害。在这项工作中,我们表明这是不正确的,应用程序权限应该以不同的方式显示给用户(例如,以聚合形式),以反映其实际含义。我们通过在Android平台上实现几个应用程序和示例隐蔽通道以及在Windows Phone 7平台上实现示例通道来演示应用程序共谋攻击的实用性。我们研究了来自Android市场的免费应用程序,并表明应用程序合谋的可能性是显著的。最后,我们讨论了可以用来减轻这些攻击的对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信