All about activity injection: Threats, semantics, and detection

Cited 8 time in webofscience Cited 7 time in scopus
  • Hit : 140
  • Download : 0
Android supports seamless user experience by maintaining activities from different apps in the same activity stack. While such close inter-app communication is essential in the Android framework, the powerful inter-app communication contains vulnerabilities that can inject malicious activities into a victim app's activity stack to hijack user interaction flows. In this paper, we demonstrate activity injection attacks with a simple malware, and formally specify the activity activation mechanism using operational semantics. Based on the operational semantics, we develop a static analysis tool, which analyzes Android apps to detect activity injection attacks. Our tool is fast enough to analyze real-world Android apps in 6 seconds on average, and our experiments found that 1,761 apps out of 129,756 real-world Android apps inject their activities into other apps' tasks.
Publisher
Institute of Electrical and Electronics Engineers Inc.
Issue Date
2017-11-03
Language
English
Citation

32nd IEEE/ACM International Conference on Automated Software Engineering, ASE 2017, pp.252 - 262

DOI
10.1109/ASE.2017.8115638
URI
http://hdl.handle.net/10203/272173
Appears in Collection
CS-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 8 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0