skip to main content
10.1145/1999995.2000018acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Analyzing inter-application communication in Android

Authors Info & Claims
Published:28 June 2011Publication History

ABSTRACT

Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provides a rich inter-application message passing system. This encourages inter-application collaboration and reduces developer burden by facilitating component reuse. Unfortunately, message passing is also an application attack surface. The content of messages can be sniffed, modified, stolen, or replaced, which can compromise user privacy. Also, a malicious application can inject forged or otherwise malicious messages, which can lead to breaches of user data and violate application security policies.

We examine Android application interaction and identify security risks in application components. We provide a tool, ComDroid, that detects application communication vulnerabilities. ComDroid can be used by developers to analyze their own applications before release, by application reviewers to analyze applications in the Android Market, and by end users. We analyzed 20 applications with the help of ComDroid and found 34 exploitable vulnerabilities; 12 of the 20 applications have at least one vulnerability.

References

  1. Android Market. http://www.android.com/market/.Google ScholarGoogle Scholar
  2. Android permissions. http://android.git.kernel.org/?p=platform/frameworks/base.git;a=blob;f=%core/res/AndroidManifest.xml.Google ScholarGoogle Scholar
  3. iPhone App Store. http://www.apple.com/iphone/apps-for-iphone/.Google ScholarGoogle Scholar
  4. MobiStealth. http://www.mobistealth.com/.Google ScholarGoogle Scholar
  5. Appventive. ICE: In case of emergency. http://www.appventive.com/ice.Google ScholarGoogle Scholar
  6. A. Barth, C. Jackson, and J. C. Mitchell. Robust defenses for cross-site request forgery. In Proc. of the 15th ACM Conference on Computer and Communications Security (CCS 2008), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Burns. Mobile application security on Android. Blackhat, 2009.Google ScholarGoogle Scholar
  8. B. Chess and G. McGraw. Static analysis for security. Security & Privacy, IEEE, 2(6):76--79, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. W. Cheswick, S. Bellovin, and A. Rubin. Firewalls and Internet security: repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazieres, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In Proc. of the 20th ACM Symposium on Operating Systems Principles, pages 17--30. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. W. Enck, P. Gilbert, B.-g. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), Vancouver, October 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri. A Study of Android Application Security. In Proc. of the 20th USENIX Security Symposium, August 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proc. of the 16th ACM Conference on Computer and Communications Security (CCS), November 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. W. Enck, M. Ongtang, and P. McDaniel. Understanding Android security. IEEE Security and Privacy, 7(1):50--57, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. P. Fuchs, A. Chaudhuri, and J. S. Foster. SCanDroid: Automated security certification of Android applications. Technical report, University of Maryland, 2009.Google ScholarGoogle Scholar
  16. M. Howard, J. Pincus, and J. Wing. Measuring relative attack surfaces. Computer Security in the 21st Century, pages 109--137, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  17. IMDb. IMDb Movies & TV. http://www.androlib.com/android.application.com-imdb-mobile-jzEzw.aspx.Google ScholarGoogle Scholar
  18. N. Jovanovic, E. Kirda, and C. Kruegel. Preventing cross site request forgery attacks. In Securecomm and Workshops, 2006, pages 1--10. IEEE, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  19. M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard OS abstractions. In Proc. of 21st ACM SIGOPS Symposium on Operating Systems Principles, pages 321--334. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. Lee. Nationwide bus. http://www.androlib.com/android.application.net-hyeongkyu-android-inche%onbus-Eqwq.aspx.Google ScholarGoogle Scholar
  21. V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In Proc. of the 14th Conference on USENIX Security Symposium, pages 18--18. USENIX Association, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. P. Manadhata, J. Wing, M. Flynn, and M. McQueen. Measuring the attack surfaces of two FTP daemons. In Proc. of the 2nd ACM Workshop on Quality of Protection, pages 3--10. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology (TOSEM), 9(4):410--442, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. G. Paller. Dedexer. http://dedexer.sourceforge.net/.Google ScholarGoogle Scholar
  25. M. A. Troy Vennon. Android malware: Spyware in the Android Market. Technical report, SMobile Systems, March 2010.Google ScholarGoogle Scholar
  26. T. Vennon. Android malware: A study of known and potential malware threats. Technical report, SMobile Systems, February 2010.Google ScholarGoogle Scholar
  27. D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium, pages 3--17, 2000.Google ScholarGoogle Scholar
  28. N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazières. Making information flow explicit in HiStar. In Proc. of the 7th Symposium on Operating Systems Design and Implementation, pages 263--278. USENIX Association, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Analyzing inter-application communication in Android

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiSys '11: Proceedings of the 9th international conference on Mobile systems, applications, and services
        June 2011
        430 pages
        ISBN:9781450306430
        DOI:10.1145/1999995

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 June 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate274of1,679submissions,16%

        Upcoming Conference

        MOBISYS '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader