Skip to main content
Top

2019 | OriginalPaper | Chapter

Notify This: Exploiting Android Notifications for Fun and Profit

Author : Efthimios Alepis

Published in: Information Systems Security and Privacy

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the era of telecommunications, where mobile phones are becoming continuously smarter, how users interact with smartphones plays a very essential role, magnified by statistics that reveal great increase in human time spent in human-smartphone interaction. Some of the basic reasons for users to use their smartphones include notifications, whose functionality has been investigated and improved over the last decade. As a result, this mechanism, namely smartphone notifications, is not only well-rounded by both OS vendors and app developers, but is also inextricably accompanying vital parts of the majority of modern mobile applications. This paper analyzes flaws in this fundamental mechanism, as found in the most widespread mobile OS to date, namely Android. After presenting forging smartphone application notifications and Denial of Service attacks to the users’ device, accomplished both locally and remotely, we conclude by proposing generic countermeasures for the security threats in question.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pielot, M., Church, K., de Oliveira, R.: An in-situ study of mobile phone notifications. In: Proceedings of the 16th International Conference on Human-computer Interaction with Mobile Devices & #38; Services, MobileHCI 2014, New York, NY, USA, pp. 233–242. ACM (2014) Pielot, M., Church, K., de Oliveira, R.: An in-situ study of mobile phone notifications. In: Proceedings of the 16th International Conference on Human-computer Interaction with Mobile Devices & #38; Services, MobileHCI 2014, New York, NY, USA, pp. 233–242. ACM (2014)
6.
go back to reference Freyne, J., Yin, J., Brindal, E., Hendrie, G., Berkovsky, S., Noakes, M.: Push notifications in diet apps: influencing engagement times and tasks. Int. J. Hum. Comput. Interact. 33, 833–845 (2017)CrossRef Freyne, J., Yin, J., Brindal, E., Hendrie, G., Berkovsky, S., Noakes, M.: Push notifications in diet apps: influencing engagement times and tasks. Int. J. Hum. Comput. Interact. 33, 833–845 (2017)CrossRef
7.
go back to reference Kerber, F., Gehring, S., Krüger, A., Löchtefeld, M.: Adding expressiveness to smartwatch notifications through ambient illumination. IJMHCI 9, 1–14 (2017) Kerber, F., Gehring, S., Krüger, A., Löchtefeld, M.: Adding expressiveness to smartwatch notifications through ambient illumination. IJMHCI 9, 1–14 (2017)
8.
go back to reference Mahmud, M.S., Islam, M.S., Rahman, M.A.: Smart fire detection system with early notifications using machine learning. Int. J. Comput. Intell. Appl. 16, 1–17 (2017) Mahmud, M.S., Islam, M.S., Rahman, M.A.: Smart fire detection system with early notifications using machine learning. Int. J. Comput. Intell. Appl. 16, 1–17 (2017)
9.
go back to reference Wang, Y., Millet, B., Smith, J.L.: Designing wearable vibrotactile notifications for information communication. Int. J. Hum. Comput. Stud. 89, 24–34 (2016)CrossRef Wang, Y., Millet, B., Smith, J.L.: Designing wearable vibrotactile notifications for information communication. Int. J. Hum. Comput. Stud. 89, 24–34 (2016)CrossRef
10.
go back to reference Patsakis, C., Alepis, E.: Knock-knock: the unbearable lightness of Android notifications. In: Mori, P., Furnell, S., Camp, O. (eds.) Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, 22–24 January 2018, pp. 52–61. SciTePress (2018) Patsakis, C., Alepis, E.: Knock-knock: the unbearable lightness of Android notifications. In: Mori, P., Furnell, S., Camp, O. (eds.) Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, 22–24 January 2018, pp. 52–61. SciTePress (2018)
12.
go back to reference Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239–252. ACM (2011) Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239–252. ACM (2011)
13.
go back to reference Niemietz, M., Schwenk, J.: UI redressing attacks on Android devices. Black Hat Abu Dhabi (2012) Niemietz, M., Schwenk, J.: UI redressing attacks on Android devices. Black Hat Abu Dhabi (2012)
14.
go back to reference Ying, L., Cheng, Y., Lu, Y., Gu, Y., Su, P., Feng, D.: Attacks and defence on Android free floating windows. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2016, New York, NY, USA, pp. 759–770. ACM (2016) Ying, L., Cheng, Y., Lu, Y., Gu, Y., Su, P., Feng, D.: Attacks and defence on Android free floating windows. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2016, New York, NY, USA, pp. 759–770. ACM (2016)
15.
go back to reference Fratantonio, Y., Qian, C., Chung, S., Lee, W.: Cloak and dagger: from two permissions to complete control of the UI feedback loop. In: Proceedings of the IEEE Symposium on Security and Privacy (Oakland), San Jose, CA (2017) Fratantonio, Y., Qian, C., Chung, S., Lee, W.: Cloak and dagger: from two permissions to complete control of the UI feedback loop. In: Proceedings of the IEEE Symposium on Security and Privacy (Oakland), San Jose, CA (2017)
18.
go back to reference Chen, Q.A., Qian, Z., Mao, Z.M.: Peeking into your app without actually seeing it: UI state inference and novel android attacks. In: USENIX Security Symposium, pp. 1037–1052 (2014) Chen, Q.A., Qian, Z., Mao, Z.M.: Peeking into your app without actually seeing it: UI state inference and novel android attacks. In: USENIX Security Symposium, pp. 1037–1052 (2014)
19.
go back to reference Xu, Z., Zhu, S.: Abusing notification services on smartphones for phishing and spamming. In: Proceedings of the 6th USENIX Conference on Offensive Technologies, USENIX Association, p. 1 (2012) Xu, Z., Zhu, S.: Abusing notification services on smartphones for phishing and spamming. In: Proceedings of the 6th USENIX Conference on Offensive Technologies, USENIX Association, p. 1 (2012)
20.
go back to reference Felt, A.P., Wagner, D.: Phishing on mobile devices. In: Proceedings of the Web 2.0 Security and Privacy 2011 Workshop (2011) Felt, A.P., Wagner, D.: Phishing on mobile devices. In: Proceedings of the Web 2.0 Security and Privacy 2011 Workshop (2011)
21.
go back to reference Virvilis, N., Tsalis, N., Mylonas, A., Gritzalis, D.: Mobile devices: a phisher’s paradise. In: 2014 11th International Conference on Security and Cryptography (SECRYPT), pp. 1–9. IEEE (2014) Virvilis, N., Tsalis, N., Mylonas, A., Gritzalis, D.: Mobile devices: a phisher’s paradise. In: 2014 11th International Conference on Security and Cryptography (SECRYPT), pp. 1–9. IEEE (2014)
22.
go back to reference Virvou, M., Alepis, E.: Mobile educational features in authoring tools for personalised tutoring. Comput. Educ. 44, 53–68 (2005)CrossRef Virvou, M., Alepis, E.: Mobile educational features in authoring tools for personalised tutoring. Comput. Educ. 44, 53–68 (2005)CrossRef
23.
go back to reference Papageorgiou, A., Strigkos, M., Politou, E.A., Alepis, E., Solanas, A., Patsakis, C.: Security and privacy analysis of mobile health applications: the alarming state of practice. IEEE Access 6, 9390–9403 (2018)CrossRef Papageorgiou, A., Strigkos, M., Politou, E.A., Alepis, E., Solanas, A., Patsakis, C.: Security and privacy analysis of mobile health applications: the alarming state of practice. IEEE Access 6, 9390–9403 (2018)CrossRef
24.
go back to reference Casino, F., Patsakis, C., Batista, E., Borras, F., Martínez-Ballesté, A.: Healthy routes in the smart city: a context-aware mobile recommender. IEEE Softw. 34, 42–47 (2017)CrossRef Casino, F., Patsakis, C., Batista, E., Borras, F., Martínez-Ballesté, A.: Healthy routes in the smart city: a context-aware mobile recommender. IEEE Softw. 34, 42–47 (2017)CrossRef
31.
go back to reference Samanta, I.: Exploring the factors of customer retention in mobile sector. IJSITA 3, 36–46 (2012) Samanta, I.: Exploring the factors of customer retention in mobile sector. IJSITA 3, 36–46 (2012)
32.
go back to reference Peng, J., Zhang, S., Quan, J., Wei, Z.: Effectiveness of mobile phone customer retention strategies. In: 11th Wuhan International Conference on E-Business, WHICEB 2012, Wuhan, China, 26–27 May 2012, vol. 63. Association for Information Systems (2012) Peng, J., Zhang, S., Quan, J., Wei, Z.: Effectiveness of mobile phone customer retention strategies. In: 11th Wuhan International Conference on E-Business, WHICEB 2012, Wuhan, China, 26–27 May 2012, vol. 63. Association for Information Systems (2012)
33.
go back to reference Viljanen, M., Airola, A., Pahikkala, T., Heikkonen, J.: Modelling user retention in mobile games. In: IEEE Conference on Computational Intelligence and Games, CIG 2016, Santorini, Greece, 20–23 September 2016, pp. 1–8. IEEE (2016) Viljanen, M., Airola, A., Pahikkala, T., Heikkonen, J.: Modelling user retention in mobile games. In: IEEE Conference on Computational Intelligence and Games, CIG 2016, Santorini, Greece, 20–23 September 2016, pp. 1–8. IEEE (2016)
35.
go back to reference Choi, H., Choi, Y.-J., Kim, K.-M.: The understanding of building trust model on smartphone application: focusing on users’ motivation. In: Kim, K.J., Ahn, S.J. (eds.) Proceedings of the International Conference on IT Convergence and Security 2011. LNEE, vol. 120, pp. 13–20. Springer, Dordrecht (2012). https://doi.org/10.1007/978-94-007-2911-7_2CrossRef Choi, H., Choi, Y.-J., Kim, K.-M.: The understanding of building trust model on smartphone application: focusing on users’ motivation. In: Kim, K.J., Ahn, S.J. (eds.) Proceedings of the International Conference on IT Convergence and Security 2011. LNEE, vol. 120, pp. 13–20. Springer, Dordrecht (2012). https://​doi.​org/​10.​1007/​978-94-007-2911-7_​2CrossRef
37.
go back to reference Bianchi, A., Corbetta, J., Invernizzi, L., Fratantonio, Y., Kruegel, C., Vigna, G.: What the app is that? deception and countermeasures in the Android user interface. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 931–948. IEEE (2015) Bianchi, A., Corbetta, J., Invernizzi, L., Fratantonio, Y., Kruegel, C., Vigna, G.: What the app is that? deception and countermeasures in the Android user interface. In: 2015 IEEE Symposium on Security and Privacy (SP), pp. 931–948. IEEE (2015)
38.
go back to reference Wu, L., Brandt, B., Du, X., Ji, B.: Analysis of clickjacking attacks and an effective defense scheme for Android devices. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 55–63. IEEE (2016) Wu, L., Brandt, B., Du, X., Ji, B.: Analysis of clickjacking attacks and an effective defense scheme for Android devices. In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 55–63. IEEE (2016)
39.
go back to reference Ying, L., Cheng, Y., Lu, Y., Gu, Y., Su, P., Feng, D.: Attacks and defence on Android free floating windows. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 759–770. ACM (2016) Ying, L., Cheng, Y., Lu, Y., Gu, Y., Su, P., Feng, D.: Attacks and defence on Android free floating windows. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 759–770. ACM (2016)
40.
go back to reference Ren, C., Liu, P., Zhu, S.: Windowguard: Systematic protection of GUI security in Android. In: Network and Distributed System Security Symposium (2017) Ren, C., Liu, P., Zhu, S.: Windowguard: Systematic protection of GUI security in Android. In: Network and Distributed System Security Symposium (2017)
42.
go back to reference Malisa, L., Kostiainen, K., Capkun, S.: Detecting mobile application spoofing attacks by leveraging user visual similarity perception. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 289–300. ACM (2017) Malisa, L., Kostiainen, K., Capkun, S.: Detecting mobile application spoofing attacks by leveraging user visual similarity perception. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, pp. 289–300. ACM (2017)
44.
go back to reference Marforio, C., Jayaram Masti, R., Soriente, C., Kostiainen, K., Čapkun, S.: Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 540–551. ACM (2016) Marforio, C., Jayaram Masti, R., Soriente, C., Kostiainen, K., Čapkun, S.: Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 540–551. ACM (2016)
45.
go back to reference Wu, L., Du, X., Wu, J.: Effective defense schemes for phishing attacks on mobile computing platforms. IEEE Trans. Veh. Technol. 65, 6678–6691 (2016)CrossRef Wu, L., Du, X., Wu, J.: Effective defense schemes for phishing attacks on mobile computing platforms. IEEE Trans. Veh. Technol. 65, 6678–6691 (2016)CrossRef
46.
go back to reference Heartfield, R., Loukas, G.: A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput. Surv. (CSUR) 48, 37 (2016) Heartfield, R., Loukas, G.: A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput. Surv. (CSUR) 48, 37 (2016)
47.
go back to reference Aleroud, A., Zhou, L.: Phishing environments, techniques, and countermeasures: a survey. Comput. Secur. 68, 160–196 (2017)CrossRef Aleroud, A., Zhou, L.: Phishing environments, techniques, and countermeasures: a survey. Comput. Secur. 68, 160–196 (2017)CrossRef
48.
go back to reference Holgers, T., Watson, D.E., Gribble, S.D.: Cutting through the confusion: a measurement study of homograph attacks. In: USENIX Annual Technical Conference, General Track, pp. 261–266 (2006) Holgers, T., Watson, D.E., Gribble, S.D.: Cutting through the confusion: a measurement study of homograph attacks. In: USENIX Annual Technical Conference, General Track, pp. 261–266 (2006)
49.
go back to reference Liu, C., Stamm, S.: Fighting unicode-obfuscated spam. In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, pp. 45–59. ACM (2007) Liu, C., Stamm, S.: Fighting unicode-obfuscated spam. In: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, pp. 45–59. ACM (2007)
Metadata
Title
Notify This: Exploiting Android Notifications for Fun and Profit
Author
Efthimios Alepis
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-25109-3_5

Premium Partner