论文标题

Android-Web杂交的大规模分析

A Large Scale Analysis of Android-Web Hybridization

论文作者

Tiwari, Abhishek, Prakash, Jyoti, Gross, Sascha, Hammer, Christian

论文摘要

许多Android应用程序通过WebView组件嵌入网页,并在Android中执行JavaScript代码。 Hybrid应用程序利用DEDICAPIS加载资源并将其渲染到WebView中。此外,可以与JavaScript世界共享Android对象。但是,桥接Android和JavaScript世界的界面也可能构成严重的安全威胁:潜在的不受信任的网页及其JavaScript可能会干扰Android环境及其对本地功能的访问。目前尚无一般分析来评估桥接这两个世界的这种混合应用程序的含义。为了了解混合应用程序的语义和效果,我们对野生杂交API的使用进行了大规模研究。我们将随机选择的7,500个随机选择和从Google PlayStore和1000个恶意软件样本中的196个最受欢迎的应用程序分析和分类为杂交API的参数。我们的结果使人们对混合应用程序的一般理解以及对潜在计划分析的影响以及当前的安全状况:我们发现了数千个敏感数据从Android到JavaScript的流量,其中绝大多数可能会流向潜在的不信任的代码。我们的分析确定了许多嵌入漏洞的网页,我们示例性地利用了漏洞。此外,我们发现了许多应用程序,其中潜在的不信任的JavaScript代码可能会干扰(值得信赖的)Android对象,包括良性和恶性应用程序。

Many Android applications embed webpages via WebView components and execute JavaScript code within Android. Hybrid applications leverage dedicated APIs to load a resource and render it in a WebView. Furthermore, Android objects can be shared with the JavaScript world. However, bridging the interfaces of the Android and JavaScript world might also incur severe security threats: Potentially untrusted webpages and their JavaScript might interfere with the Android environment and its access to native features. No general analysis is currently available to assess the implications of such hybrid apps bridging the two worlds. To understand the semantics and effects of hybrid apps, we perform a large-scale study on the usage of the hybridization APIs in the wild. We analyze and categorize the parameters to hybridization APIs for 7,500 randomly selected and the 196 most popular applications from the Google Playstore as well as 1000 malware samples. Our results advance the general understanding of hybrid applications, as well as implications for potential program analyses, and the current security situation: We discovered thousands of flows of sensitive data from Android to JavaScript, the vast majority of which could flow to potentially untrustworthy code. Our analysis identified numerous web pages embedding vulnerabilities, which we exemplarily exploited. Additionally, we discovered a multitude of applications in which potentially untrusted JavaScript code may interfere with (trusted) Android objects, both in benign and malign applications.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源