Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
It is pretty well known that insecure code updating procedures for Android allow remote code injection attack. However, other than codes, there are many resources in Android that have to be updated, such as temporary files, images, databases, and configurations (XML and JSON). Security of update pro...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2018/2489214 |
id |
doaj-80c0152090aa48b297ad0726e63dd3ca |
---|---|
record_format |
Article |
spelling |
doaj-80c0152090aa48b297ad0726e63dd3ca2020-11-24T21:30:55ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/24892142489214Large-Scale Analysis of Remote Code Injection Attacks in Android AppsHyunwoo Choi0Yongdae Kim1KAIST, Daejeon, Republic of KoreaKAIST, Daejeon, Republic of KoreaIt is pretty well known that insecure code updating procedures for Android allow remote code injection attack. However, other than codes, there are many resources in Android that have to be updated, such as temporary files, images, databases, and configurations (XML and JSON). Security of update procedures for these resources is largely unknown. This paper investigates general conditions for remote code injection attacks on these resources. Using this, we design and implement a static detection tool that automatically identifies apps that meet these conditions. We apply the detection tool to a large dataset comprising 9,054 apps, from three different types of datasets: official market, third-party market, and preinstalled apps. As a result, 97 apps were found to be potentially vulnerable, with 53 confirmed as vulnerable to remote code injection attacks.http://dx.doi.org/10.1155/2018/2489214 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Hyunwoo Choi Yongdae Kim |
spellingShingle |
Hyunwoo Choi Yongdae Kim Large-Scale Analysis of Remote Code Injection Attacks in Android Apps Security and Communication Networks |
author_facet |
Hyunwoo Choi Yongdae Kim |
author_sort |
Hyunwoo Choi |
title |
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps |
title_short |
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps |
title_full |
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps |
title_fullStr |
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps |
title_full_unstemmed |
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps |
title_sort |
large-scale analysis of remote code injection attacks in android apps |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2018-01-01 |
description |
It is pretty well known that insecure code updating procedures for Android allow remote code injection attack. However, other than codes, there are many resources in Android that have to be updated, such as temporary files, images, databases, and configurations (XML and JSON). Security of update procedures for these resources is largely unknown. This paper investigates general conditions for remote code injection attacks on these resources. Using this, we design and implement a static detection tool that automatically identifies apps that meet these conditions. We apply the detection tool to a large dataset comprising 9,054 apps, from three different types of datasets: official market, third-party market, and preinstalled apps. As a result, 97 apps were found to be potentially vulnerable, with 53 confirmed as vulnerable to remote code injection attacks. |
url |
http://dx.doi.org/10.1155/2018/2489214 |
work_keys_str_mv |
AT hyunwoochoi largescaleanalysisofremotecodeinjectionattacksinandroidapps AT yongdaekim largescaleanalysisofremotecodeinjectionattacksinandroidapps |
_version_ |
1725961111090495488 |