SlideShare a Scribd company logo
Revealing Android 3PLs -based attacks
Amina Waddiz
Supervised by: Prof. Jong Kim
Mentored by: Beumjin Cho
August 27th, 2015
Summary
1. Introduction
2. Motivation, Goals and Contribution
3. 3PLs Classification and usage
4. 3PLs-based attacks
5. Conclusion
Introduction
Android Security Model
DAC/MAC
MAC: Permission-based
3PLs+App
Same process
Same permissions
Android: Attack surface
Current state: Ad Libs
Other libs ?
Motivation & Goals
Motivation:
→ Protect the User privacy
→ Defend the System safety
Goals:
→ Generalize 3PLs usage
→ Identify 3PLs-based attacks
Background
Android app and permissions
Android System
External Server
3PLs
App
Contribution
- Classification
- Usage
- 3PLs-based
attacks
Android System
External Server
3PLs
App
Contribution (1)
- Classification
- Usage
- 3PLs-based
attacks
Overview of existing 3PLs
1. Build.gradle
2. Activity.xml
3. AndroidManifest
4. Calls in java Classes
3PLs typical usage
Android System
External Server
3PLs
App
Contribution (2)
- Classification
- Usage
- 3PLs-based
attacks
Attack Example: Steal sensitive data
Category Description Examples
Functional
Classification
Privacy User’s sensitive data - Contacts
- Location
- Phone identity
Financial
Damage
Make revenue -Premium
SMS/Calls
-Online Banking
Frauds
Device Usability Damage device
utilities
- Drain Battery
- Lock the screen
Agent-based
Classification
Memory Access memory
stack and heap
- Bus Monitoring
attack
Network GSM networks
(Local stations not
device)
- Attach Flood
(Denial of service)
Overview of 3PLs-based attacks
Conclusion
● An analysis and classification for Android 3PLs
and their threat:
○ Collected, studied and classified the most used 3PLs
in android apps
○ Unveiled 3PLs-based threats attacking some android
components
● Necessity of a novel approach to tackle 3PLs-
based malware:
○ Build an efficient tool to ISOLATE 3PLs from the host
application

More Related Content

Similar to Revealing Android 3PLs-based attacks

Detection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksDetection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacks
Amina WADDIZ
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar
Jisoo Park
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
Vandana Verma
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
Minali Arora
 
Android security
Android security Android security
Android security
Hassan Abutair
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
IJNSA Journal
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
Vinoth Kanna
 
Final_Presentation_FlowDroid
Final_Presentation_FlowDroidFinal_Presentation_FlowDroid
Final_Presentation_FlowDroid
Kruti Sharma
 
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber AttacksThe Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
AlienVault
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
Blue Coat
 
Android security
Android securityAndroid security
Android security
Dr Amira Bibo
 
Android security
Android securityAndroid security
Android security
Dr Amira Bibo
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
shriram suryanarayanan
 
Android open-source operating System for mobile devices
Android open-source operating System for mobile devicesAndroid open-source operating System for mobile devices
Android open-source operating System for mobile devices
IOSR Journals
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
webhostingguy
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
Shubhneet Goel
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Ishan Girdhar
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
Sergey Kochergan
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
Allessandra Negri
 
Android_Nougats_security_issues_and_solutions.pdf
Android_Nougats_security_issues_and_solutions.pdfAndroid_Nougats_security_issues_and_solutions.pdf
Android_Nougats_security_issues_and_solutions.pdf
Talha Naqash
 

Similar to Revealing Android 3PLs-based attacks (20)

Detection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksDetection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacks
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
 
Android security
Android security Android security
Android security
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
 
Final_Presentation_FlowDroid
Final_Presentation_FlowDroidFinal_Presentation_FlowDroid
Final_Presentation_FlowDroid
 
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber AttacksThe Lazy Attacker: Defending Against Broad-based Cyber Attacks
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Android security
Android securityAndroid security
Android security
 
Android security
Android securityAndroid security
Android security
 
OS-Project-Report-Team-8
OS-Project-Report-Team-8OS-Project-Report-Team-8
OS-Project-Report-Team-8
 
Android open-source operating System for mobile devices
Android open-source operating System for mobile devicesAndroid open-source operating System for mobile devices
Android open-source operating System for mobile devices
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
 
Android_Nougats_security_issues_and_solutions.pdf
Android_Nougats_security_issues_and_solutions.pdfAndroid_Nougats_security_issues_and_solutions.pdf
Android_Nougats_security_issues_and_solutions.pdf
 

Revealing Android 3PLs-based attacks