Skip to main content
Top

2019 | OriginalPaper | Chapter

Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications

Authors : Mark H. Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang

Published in: Information Security and Cryptology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The number of Android smartphone and tablet users has experienced a rapid growth in the past few years and it raises users’ awareness on privacy and security issues of their mobile devices. There are lots of users rooting their Android devices for some useful functions, which are not originally provided to developers and users, such as taking screenshot and screen recording. However, after observing the danger of rooting devices, the developers begin to look for non-root alternatives to implement those functions. Android Debug Bridge (ADB) workaround is one of the best known non-root alternatives to help app gain a higher privilege on Android. It used to be considered as a secure practice until some cases of ADB privilege leakage have been found. In this paper, we propose an approach to identify the potential privilege leakage in Android apps that using ADB workaround. We apply our approach to analyze three real-world apps that are downloaded from Google Play Store. We then present a general methodology to conduct exploitation on those apps using ADB workaround. Based on our study, we suggest some mitigation techniques to help developers create their apps that not only satisfy users’ needs but also protect users’ privacy from similar attacks in future.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
2
The full directory path is /data/data/com.edwardkim.android.screenshotitfullnoro ot/temp.
 
Literature
1.
go back to reference Bai, G., et al.: All your sessions are belong to us: investigating authenticator leakage through backup channels on android. In: Proceedings of the 20th International Conference on Engineering of Complex Computer Systems (ICECCS) (2015) Bai, G., et al.: All your sessions are belong to us: investigating authenticator leakage through backup channels on android. In: Proceedings of the 20th International Conference on Engineering of Complex Computer Systems (ICECCS) (2015)
2.
go back to reference Batyuk, L., Herpich, M., Camtepe, S.A., Raddatz, K., Schmidt, A., Albayrak, S.: Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications. In: 2011 6th International Conference on Malicious and Unwanted Software, pp. 66–72, October 2011 Batyuk, L., Herpich, M., Camtepe, S.A., Raddatz, K., Schmidt, A., Albayrak, S.: Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications. In: 2011 6th International Conference on Malicious and Unwanted Software, pp. 66–72, October 2011
3.
go back to reference Bishop, M.: Unix security: threats and solutions (1996) Bishop, M.: Unix security: threats and solutions (1996)
4.
go back to reference Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R., Shastry, B.: Towards taming privilege-escalation attacks on android. In: NDSS. vol. 17, p. 19. Citeseer (2012) Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.R., Shastry, B.: Towards taming privilege-escalation attacks on android. In: NDSS. vol. 17, p. 19. Citeseer (2012)
5.
go back to reference Chen, H., Li, N., Enck, W., Aafer, Y., Zhang, X.: Analysis of seandroid policies: combining MAC and DAC in android. In: Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 553–565. ACM (2017) Chen, H., Li, N., Enck, W., Aafer, Y., Zhang, X.: Analysis of seandroid policies: combining MAC and DAC in android. In: Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 553–565. ACM (2017)
7.
go back to reference Ferrill, P.: Navigating the android SDK. In: Pro Android Python with SL4A, pp. 57–82. Apress (2011) Ferrill, P.: Navigating the android SDK. In: Pro Android Python with SL4A, pp. 57–82. Apress (2011)
13.
go back to reference Lin, C.C., Li, H., Zhou, X.Y., Wang, X.: Screenmilker: how to milk your android screen for secrets. In: NDSS (2014) Lin, C.C., Li, H., Zhou, X.Y., Wang, X.: Screenmilker: how to milk your android screen for secrets. In: NDSS (2014)
15.
go back to reference Meng, H., Thing, V.L.L., Cheng, Y., Dai, Z., Zhang, L.: A survey of android exploits in the wild. Comput. Secur. 76, 71–91 (2018)CrossRef Meng, H., Thing, V.L.L., Cheng, Y., Dai, Z., Zhang, L.: A survey of android exploits in the wild. Comput. Secur. 76, 71–91 (2018)CrossRef
17.
go back to reference Provos, N., Friedl, M., Honeyman, P.: Preventing privilege escalation. In: USENIX Security, vol. 3 (2003) Provos, N., Friedl, M., Honeyman, P.: Preventing privilege escalation. In: USENIX Security, vol. 3 (2003)
19.
go back to reference Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: a comprehensive security assessment. IEEE Secur. Priv. 8(2), 35–44 (2010)CrossRef Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: a comprehensive security assessment. IEEE Secur. Priv. 8(2), 35–44 (2010)CrossRef
21.
go back to reference Wang, Y., Rountev, A.: Who changed you?: obfuscator identification for android. In: Proceedings of the 4th International Conference on Mobile Software Engineering and Systems, pp. 154–164. IEEE Press (2017) Wang, Y., Rountev, A.: Who changed you?: obfuscator identification for android. In: Proceedings of the 4th International Conference on Mobile Software Engineering and Systems, pp. 154–164. IEEE Press (2017)
22.
go back to reference Zhang, H., She, D., Qian, Z.: Android root and its providers: a double-edged sword. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1093–1104. ACM (2015) Zhang, H., She, D., Qian, Z.: Android root and its providers: a double-edged sword. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1093–1104. ACM (2015)
23.
go back to reference Zhang, L., Meng, H., Thing, V.L.L.: Progressive control flow obfuscation for android applications. Region 10 Conference, TENCON 2018 IEEE (2018) Zhang, L., Meng, H., Thing, V.L.L.: Progressive control flow obfuscation for android applications. Region 10 Conference, TENCON 2018 IEEE (2018)
Metadata
Title
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications
Authors
Mark H. Meng
Guangdong Bai
Joseph K. Liu
Xiapu Luo
Yu Wang
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-14234-6_19

Premium Partner