skip to main content
10.1145/2076732.2076781acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Attacks on WebView in the Android system

Published:05 December 2011Publication History

ABSTRACT

WebView is an essential component in both Android and iOS platforms, enabling smartphone and tablet apps to embed a simple but powerful browser inside them. To achieve a better interaction between apps and their embedded "browsers", WebView provides a number of APIs, allowing code in apps to invoke and be invoked by the JavaScript code within the web pages, intercept their events, and modify those events. Using these features, apps can become customized "browsers" for their intended web applications. Currently, in the Android market, 86 percent of the top 20 most downloaded apps in 10 diverse categories use WebView.

The design of WebView changes the landscape of the Web, especially from the security perspective. Two essential pieces of the Web's security infrastructure are weakened if WebView and its APIs are used: the Trusted Computing Base (TCB) at the client side, and the sandbox protection implemented by browsers. As results, many attacks can be launched either against apps or by them. The objective of this paper is to present these attacks, analyze their fundamental causes, and discuss potential solutions.

References

  1. Caja. http://code.google.com/p/google-caja/.Google ScholarGoogle Scholar
  2. Droidgap. http://www.phonegap.com.Google ScholarGoogle Scholar
  3. Extracting html from a webview. http://lexandera.com/2009/01/extracting-html-from-a-webview/.Google ScholarGoogle Scholar
  4. A tool for converting android's .dex format to java's .class format. http://code.google.com/p/dex2jar.Google ScholarGoogle Scholar
  5. Injecting javascript into a webview. http://lexandera.com/2009/01/injecting-javascript-into-a-webview/, 2009.Google ScholarGoogle Scholar
  6. Intercepting page loads in webview. http://lexandera.com/2009/02/intercepting-page-loads-in-webview/, 2009.Google ScholarGoogle Scholar
  7. Researchers expose android webkit browser exploit. http://www.zdnet.co.uk/news/security-threats/2010/11/08/researchers-expose-android-webkit//-browser-exploit-40090787/, November 2010.Google ScholarGoogle Scholar
  8. U. S. smartphone market: WhoâĂŹs the most wanted? http://blog.nielsen.com/nielsenwire/, 2011.Google ScholarGoogle Scholar
  9. David Barrera, H. G. üne ş Kayacik, Paul C. van Oorschot, and Anil Somayaji. A methodology for empirical analysis of permission-based security models and its application to android. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 73--84, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Crockford. ADSafe. http://www.adsafe.org.Google ScholarGoogle Scholar
  11. W. Enck, P. Gilbert, B. G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1--6, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 235--245, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified, 2011.Google ScholarGoogle Scholar
  14. E. A. Hernandez. War of the mobile browsers. IEEE Pervasive Computing, 8:82--85, January 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Jaaksi. Developing mobile browsers in a product line. IEEE Software, 19:73--80, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Jayaraman, W. Du, B. Rajagopalan, and S. J. Chapin. Escudo: A fine-grained protection model for web browsers. In Proceedings of the 30th International Conference on Distributed Computing Systems (ICDCS), Genoa, Italy, June 21--25 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Luo and W. Du. Contego: Capability-based access control for web browsers. In TRUST'11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Maffeis, J. C. Mitchell, and A. Taly. Object capabilities and isolation of untrusted web applications. In IEEE Symposium on Security and Privacy, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. D. McMahon. Learn android programming, 2011.Google ScholarGoogle Scholar
  20. L. A. Meyerovich and B. Livshits. Conscript: Specifying and enforcing fine-grained security policies for javascript in the browser. In IEEE Symposium on Security and Privacy, pages 481--496, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Palviainen and T. Laakko. Mimeframe - a framework for statically and dynamically composed adaptable mobile browsers. 2006.Google ScholarGoogle Scholar
  22. F. Reynolds. Web 2.0-in your hand. IEEE Pervasive Computing, 8:86--88, January 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Hashimi S. Komatineni, D. MacLean. Pro android 3, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. H. Shen, Z. Pan, H. Sun, Y. Lu, and S. Li. A proxy-based mobile web browser. In Proceedings of the international conference on Multimedia, MM '10, pages 763--766, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Stamm, B. Sterne, and G. Markham. Reining in the web with content security policy. In WWW, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Android Development Team. Webviewclient hooks list. http://developer.android.com/reference/android/webkit/WebViewClient.html.Google ScholarGoogle Scholar
  27. T. Vennon and D. Stroop. Threat analysis of the android market, 2010.Google ScholarGoogle Scholar
  28. P. Ye. Research on mobile browser's model and evaluation. Structure, pages 712--715, 2010.Google ScholarGoogle Scholar

Index Terms

  1. Attacks on WebView in the Android system

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ACSAC '11: Proceedings of the 27th Annual Computer Security Applications Conference
          December 2011
          432 pages
          ISBN:9781450306720
          DOI:10.1145/2076732

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 December 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate104of497submissions,21%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader