Skip to main content

2019 | OriginalPaper | Buchkapitel

Malicious Intentions: Android Internet Permission Security Risks

verfasst von : John Mark Andah, Jinfu Chen

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many Android applications access internet networks to query, retrieve or transmit digital resources. The current version of the Android Operating System (OS) fails to provide sufficient control to the user over the amount of internet access an application has. This raises concerns for data security. Significant user data vulnerability is introduced when applications can perform unsolicited data collection in the background without user knowledge. This paper analyzes the permissions of a cross-section of android applications. We focus on the INTERNET permission, and how its classification introduces significant vulnerability onto a user’s device. Subsequently, we create a proof of concept app that exploits private user data using social engineering. Our findings conclude that the INTERNET permission is a critical permission, prone to exploitation and lacks sufficient user control in the Android OS. We propose methods for the control and protection of data by the Android system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Demetriou, S., Merrill, W., Yang, W., Zhang, A., Gunter, C.A.: Free for all! Assessing user data exposure to advertising libraries on Android. In: NDSS (2016) Demetriou, S., Merrill, W., Yang, W., Zhang, A., Gunter, C.A.: Free for all! Assessing user data exposure to advertising libraries on Android. In: NDSS (2016)
5.
Zurück zum Zitat Yadav, S., Apurva, A., Ranakoti, P., Tomer, S., Roy, N.R.: Android vulnerabilities and security. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 204–208. IEEE (2017) Yadav, S., Apurva, A., Ranakoti, P., Tomer, S., Roy, N.R.: Android vulnerabilities and security. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 204–208. IEEE (2017)
6.
Zurück zum Zitat Rangwala, M., Zhang, P., Zou, X., Li, F.: A taxonomy of privilege escalation attacks in Android applications. Int. J. Secur. Netw. 9(1), 40–55 (2014)CrossRef Rangwala, M., Zhang, P., Zou, X., Li, F.: A taxonomy of privilege escalation attacks in Android applications. Int. J. Secur. Netw. 9(1), 40–55 (2014)CrossRef
9.
Zurück zum Zitat Schlegel, R., Zhang, K., Zhou, X.-Y., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: a stealthy and context-aware sound trojan for smartphones. In: NDSS, vol. 11, pp. 17–33 (2011) Schlegel, R., Zhang, K., Zhou, X.-Y., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: a stealthy and context-aware sound trojan for smartphones. In: NDSS, vol. 11, pp. 17–33 (2011)
11.
Zurück zum Zitat Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in Android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291–307. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30921-2_17CrossRef Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in Android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291–307. Springer, Heidelberg (2012). https://​doi.​org/​10.​1007/​978-3-642-30921-2_​17CrossRef
12.
Zurück zum Zitat Fang, Z., Han, W., Li, Y.: Permission based Android security: issues and countermeasures. Comput. Secur. 43, 205–218 (2014)CrossRef Fang, Z., Han, W., Li, Y.: Permission based Android security: issues and countermeasures. Comput. Secur. 43, 205–218 (2014)CrossRef
13.
Zurück zum Zitat Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to Android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73–84. ACM (2010) Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to Android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73–84. ACM (2010)
14.
Zurück zum Zitat Watanabe, T., et al.: Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. In: Proceedings of the 14th International Conference on Mining Software Repositories, pp. 14–24. IEEE Press (2017) Watanabe, T., et al.: Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps. In: Proceedings of the 14th International Conference on Mining Software Repositories, pp. 14–24. IEEE Press (2017)
16.
Zurück zum Zitat Alshehri, A., Hewins, A., McCulley, M., Alshahrani, H., Fu, H., Zhu, Y.: Risks behind device information permissions in Android OS. Commun. Netw. 9, 219–234 (2017)CrossRef Alshehri, A., Hewins, A., McCulley, M., Alshahrani, H., Fu, H., Zhu, Y.: Risks behind device information permissions in Android OS. Commun. Netw. 9, 219–234 (2017)CrossRef
Metadaten
Titel
Malicious Intentions: Android Internet Permission Security Risks
verfasst von
John Mark Andah
Jinfu Chen
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-37352-8_10