Mostrar el registro sencillo del ítem

dc.contributor.authorReardon, Joel
dc.contributor.authorFeal, Álvaro 
dc.contributor.authorWijesekera, Primal
dc.contributor.authorElazari Bar On, Amit
dc.contributor.authorVallina-Rodriguez, Narseo 
dc.contributor.authorEgelman, Serge
dc.date.accessioned2021-07-13T09:38:34Z
dc.date.available2021-07-13T09:38:34Z
dc.date.issued2019-08-14
dc.identifier.urihttp://hdl.handle.net/20.500.12761/715
dc.description.abstractModern smartphone platforms implement permission-based models to protect access to sensitive data and system resources. However, apps can circumvent the permission model and gain access to protected data without user consent by using both covert and side channels. Side channels present in the implementation of the permission system allow apps to access protected data and system resources without permission; whereas covert channels enable communication between two colluding apps so that one app can share its permission-protected data with another app lacking those permissions. Both pose threats to user privacy. In this work, we make use of our infrastructure that runs hundreds of thousands of apps in an instrumented environment. This testing environment includes mechanisms to monitor apps' runtime behaviour and network traffic. We look for evidence of side and covert channels being used in practice by searching for sensitive data being sent over the network for which the sending app did not have permissions to access it. We then reverse engineer the apps and third-party libraries responsible for this behaviour to determine how the unauthorized access occurred. We also use software fingerprinting methods to measure the static prevalence of the technique that we discover among other apps in our corpus. Using this testing environment and method, we uncovered a number of side and covert channels in active use by hundreds of popular apps and third-party SDKs to obtain unauthorized access to both unique identifiers as well as geolocation data. We have responsibly disclosed our findings to Google and have received a bug bounty for our work.
dc.language.isoeng
dc.title50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions Systemsen
dc.typeconference object
dc.conference.date14-16 August 2019
dc.conference.placeSanta Clara, CA, USA
dc.conference.titleThe 28th USENIX Security Symposium (USENIX Security 2019)*
dc.event.typeconference
dc.pres.typepaper
dc.type.hasVersionVoR
dc.rights.accessRightsopen access
dc.description.refereedTRUE
dc.description.statuspub
dc.eprint.idhttp://eprints.networks.imdea.org/id/eprint/2009


Ficheros en el ítem

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem