Detecting Hidden Attacks through the Mobile App-Web Interfaces Yan Chen Lab of Internet and Security Technology (LIST) Northwestern University, USA Motivation Scan Automatically Click on the buttons Downloaded phishing app Motivation • Vast effort has been spent analyzing the malicious apps themselves – For both industry and academia • An important, yet unexplored vector of malware propagation is benign, legitimate apps that lead users to websites hosting malicious apps • We call this hidden attacks though the app-web interface Contributions • Develop a framework for analyzing the app-web interfaces in Android applications • Develop a novel technique to interact with UI widgets to trigger app-web interface • Conduct a systematic study to associate ad networks with ad library packages • Detect hidden attacks – Tested 600,000 apps in two months – Found several unknown attacks: a rogue antivirus scam, free iPad and iPhone scams, and ads propagating SMS trojans Outline • • • • Background on mobile advertising System Design Detection Results Case study Advertising Overview 6 Publishers and Advertisers • Publishers – show ads to users • Advertisers – the brand owners that wish to advertise 7 Ad networks • Also called aggregators • Link advertisers to publishers • Buy ad space from publishers; sell to advertisers • Sophisticated algorithms for –Targeting –Inventory management 8 Ad networks • Ad networks may interface with each other • Syndication –One ad network asks another to fill ad space • Ad exchange –Real time auction of ad inventory –Bidding from many ad networks for many ad spaces Mobile In-app Advertising • Ad networks provide glue code that apps can embed and communicate with ad servers – Ad libraries, which identify ad networks • Web links embedded directly in apps • Malicious links are visited via the landing pages of ads coming from ad networks –Though the apps themselves are benign Outline • • • • Background on mobile advertising System Design Detection Results Case study Overview of Detection Methodology Trigger Appweb interfaces App DataSet Dynamic App Analysis URL scanning Redirection Chains Downloaded Files <CODE> WEBSITE </CODE> File scanning Landing Pages Dynamic webpage analysis Malware and scan report • Triggering Components –Interact with the app to launch web links • Detection –Include the various processes to detect malicious and benig that may occur as a result of triggering • Provenance –Understand the cause or origin of a detected malicious activity, and attribute events to a specific domain or an ad library Triggering App-Web interfaces • Application UI Exploration –Use the heuristics and algorithms developed in AppsPlayground [Codaspy2013] • Handling Webviews –Develop based on Selendroid to interact with Webviews –Apply computer vision techniques UI Exploration of AppsPlayground Examples of Handling Webviews  Bounding boxes are depicted as red rectangles.  The top two figures contain the whole screen while the bottom figure is just an ad.  Note the detection of buttons. Detection • Redirection chains • Landing pages – In a browser configured with a realistic user agent and window size – Download any files that can be downloaded • File and URL scanning – VirusTotal URL blacklists • Google Safebrowsing, Websense, … – VirusTotal antivirus engines • Symantec, Dr. Web, Kaspersky, Eset, … Provenance • Understand the cause and origins of attacks • Approach 1: through redirection chains – Identify the parties owning the URLs leading up to the landing URL • Approach 2: attribute code-level elements to locate it: at app or ad libraries? Discovering Ad Networks • First systematic step towards understanding malvertising • Finding ad libraries –Typically have their own Java packages, e.g., com.google.ads –Disassemble the app and get Java packages Approach 1 • Find frequent packages • Ad networks included in many apps so their packages will be frequent • So are some other packages, e.g., Apache libs, game development libs,… • Have to manually filter them

pdf文档 2015-《通过移动APP-Web接口来监测隐藏攻击-陈焰》

安全研究库 > 网络论坛材料 > 漏洞挖掘与源代码安全论坛 > 文档预览
40 页 0 下载 52 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2015-《通过移动APP-Web接口来监测隐藏攻击-陈焰》 第 1 页 2015-《通过移动APP-Web接口来监测隐藏攻击-陈焰》 第 2 页 2015-《通过移动APP-Web接口来监测隐藏攻击-陈焰》 第 3 页 2015-《通过移动APP-Web接口来监测隐藏攻击-陈焰》 第 4 页 2015-《通过移动APP-Web接口来监测隐藏攻击-陈焰》 第 5 页
下载文档到电脑,方便使用
还有 35 页可预览,继续阅读
本文档由 张玉竹2022-04-07 17:23:03上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言