Preventing and detecting state inference attacks on Android

Possemato, Andrea; Nisi, Dario; Fratantonio, Yanick
NDSS 2021, Network and Distributed System Security Symposium, 21-24 February 2021, San Diego, CA, USA (Virtual Conference)

In the realm of the Android ecosystem, one relevant threat is posed by phishing attacks. Phishing attacks are particularly problematic for mobile platforms because they do not provide enough information for a user to reliably distinguish a legitimate app from a malicious app spoofing the UI of the legitimate one. A key factor that determines the success rate of a phishing attack is proper timing: The user is more prone to provide sensitive data (such as her passwords) if the malicious spoofed UI appears when the victim expects to interact with the target app. On Android, malware determines the right timing by mounting so-called state inference attacks, which can be used, for example, to infer the exact moment that the user started a target app and thus expects to interact with it. Even though Android app sandbox is designed to prevent these attacks, they are still possible by abusing vulnerable APIs that leak such sensitive information: the usual scenario is a malicious app that “polls” these vulnerable APIs, infers when a target app is about to be used by the user, and makes the spoofed UI appear on top of the screen at the right time. All previous bugs of this kind have been fixed in the latest version of Android. This paper presents two main research contributions related to preventing and detecting state inference attacks. First, we discuss the design and implementation of a new vulnerability detection system, which specifically aims at identifying new vulnerabilities that can be used to mount state inference attacks. Our approach relies on both static and dynamic analysis techniques and it identified 18 previously unknown bugs (leading to 6 CVE) in the latest versions of Android. Second, we present a new on-device analysis system able to detect exploitation attempts of vulnerable resources and APIs. This system is based on the key hypothesis that mere “polling behaviors” can be used as a strong signal of a potential attack, independently of other factors (that previous works rely on). We performed an empirical analysis over a corpus of benign and malicious apps, and we find that this hypothesis is indeed correct. This approach has the advantage of being able to detect exploitation attempts even when the abused API is not known to be vulnerable in advance. We implemented this system as an Android framework modification, and we show it incurs a negligible overhead. 


DOI
Type:
Conference
City:
San Diego
Date:
2021-02-21
Department:
Digital Security
Eurecom Ref:
6420
Copyright:
© ISOC. Personal use of this material is permitted. The definitive version of this paper was published in NDSS 2021, Network and Distributed System Security Symposium, 21-24 February 2021, San Diego, CA, USA (Virtual Conference) and is available at : http://dx.doi.org/10.14722/NDSS.2021.24479

PERMALINK : https://www.eurecom.fr/publication/6420