调查android中的键盘记录威胁-用户视角(常规研究论文)

Fadi Mohsen, Emmanuel Bello-Ogunu, Mohamed Shehab
{"title":"调查android中的键盘记录威胁-用户视角(常规研究论文)","authors":"Fadi Mohsen, Emmanuel Bello-Ogunu, Mohamed Shehab","doi":"10.1109/MOBISECSERV.2016.7440223","DOIUrl":null,"url":null,"abstract":"Keylogging threats have been reasonably studied in computer systems but poorly covered in the domain of mobile operating systems. Android took the lead among the other mobile operating systems in allowing developers to build custom third-party keyboards to replace the stock Android on-screen keyboard. This opened the door for malicious developers to create keyloggers for the purpose of spying and/or phishing for users' sensitive data. A malicious developer may build a keylogger from scratch or utilize an existing keyboard. Furthermore, users may unknowingly install keyloggers from the online app markets or may use a keylogger that a malicious user with physical access has installed on their devices. In this paper, we discuss users' and keyboard developers' roles in increasing/decreasing the chance of successful keylogger attacks. We developed an Android app, KBsChecker, and asked participants to install it on their devices. The app collects data from participants' devices and prompts them to complete a survey. We also asked a number of developers to answer a few questions with regard to their experiences in building third-party keyboards. Our study showed that keylogging threat is of high probability due to the current security configurations and the choices of users and developers. Moreover, the study showed that the risk can be mitigated by educating users and by adopting new development approaches.","PeriodicalId":296302,"journal":{"name":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Investigating the keylogging threat in android — User perspective (Regular research paper)\",\"authors\":\"Fadi Mohsen, Emmanuel Bello-Ogunu, Mohamed Shehab\",\"doi\":\"10.1109/MOBISECSERV.2016.7440223\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Keylogging threats have been reasonably studied in computer systems but poorly covered in the domain of mobile operating systems. Android took the lead among the other mobile operating systems in allowing developers to build custom third-party keyboards to replace the stock Android on-screen keyboard. This opened the door for malicious developers to create keyloggers for the purpose of spying and/or phishing for users' sensitive data. A malicious developer may build a keylogger from scratch or utilize an existing keyboard. Furthermore, users may unknowingly install keyloggers from the online app markets or may use a keylogger that a malicious user with physical access has installed on their devices. In this paper, we discuss users' and keyboard developers' roles in increasing/decreasing the chance of successful keylogger attacks. We developed an Android app, KBsChecker, and asked participants to install it on their devices. The app collects data from participants' devices and prompts them to complete a survey. We also asked a number of developers to answer a few questions with regard to their experiences in building third-party keyboards. Our study showed that keylogging threat is of high probability due to the current security configurations and the choices of users and developers. Moreover, the study showed that the risk can be mitigated by educating users and by adopting new development approaches.\",\"PeriodicalId\":296302,\"journal\":{\"name\":\"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MOBISECSERV.2016.7440223\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MOBISECSERV.2016.7440223","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

键盘记录威胁已经在计算机系统中得到了合理的研究,但在移动操作系统领域的研究却很少。Android在允许开发者自定义第三方键盘以取代现有的Android屏幕键盘方面领先于其他移动操作系统。这为恶意开发人员创建键盘记录器打开了大门,目的是监视和/或钓鱼用户的敏感数据。恶意的开发人员可能会从头开始构建键盘记录程序或利用现有的键盘。此外,用户可能在不知情的情况下从在线应用程序市场安装键盘记录器,或者可能使用具有物理访问权限的恶意用户安装在其设备上的键盘记录器。在本文中,我们讨论了用户和键盘开发人员在增加/减少键盘记录器攻击成功机会方面的作用。我们开发了一个Android应用程序KBsChecker,并要求参与者在他们的设备上安装它。该应用程序从参与者的设备中收集数据,并提示他们完成一项调查。我们还询问了一些开发人员关于他们在构建第三方键盘方面的经验。我们的研究表明,由于当前的安全配置以及用户和开发人员的选择,键盘记录威胁的概率很高。此外,研究表明,可以通过教育用户和采用新的开发方法来减轻风险。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Investigating the keylogging threat in android — User perspective (Regular research paper)
Keylogging threats have been reasonably studied in computer systems but poorly covered in the domain of mobile operating systems. Android took the lead among the other mobile operating systems in allowing developers to build custom third-party keyboards to replace the stock Android on-screen keyboard. This opened the door for malicious developers to create keyloggers for the purpose of spying and/or phishing for users' sensitive data. A malicious developer may build a keylogger from scratch or utilize an existing keyboard. Furthermore, users may unknowingly install keyloggers from the online app markets or may use a keylogger that a malicious user with physical access has installed on their devices. In this paper, we discuss users' and keyboard developers' roles in increasing/decreasing the chance of successful keylogger attacks. We developed an Android app, KBsChecker, and asked participants to install it on their devices. The app collects data from participants' devices and prompts them to complete a survey. We also asked a number of developers to answer a few questions with regard to their experiences in building third-party keyboards. Our study showed that keylogging threat is of high probability due to the current security configurations and the choices of users and developers. Moreover, the study showed that the risk can be mitigated by educating users and by adopting new development approaches.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信