Communication publiée dans un périodique (Colloques, congrès, conférences scientifiques et actes)
Borrowing your enemy's arrows: the case of code reuse in android via direct inter-app code invocation
GAO, Jun; li, li; KONG, Pingfan et al.
2020In ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering
Peer reviewed
 

Documents


Texte intégral
article.pdf
Preprint Auteur (2.33 MB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Android; Java Reflection; DICI
Résumé :
[en] {The Android ecosystem offers different facilities to enable communication among app components and across apps to ensure that rich services can be composed through functionality reuse. At the heart of this system is the Inter-component communication (ICC) scheme, which has been largely studied in the literature. Less known in the community is another powerful mechanism that allows for direct inter-app code invocation which opens up for different reuse scenarios, both legitimate or malicious. This paper exposes the general workflow for this mechanism, which beyond ICCs, enables app developers to access and invoke functionalities (either entire Java classes, methods or object fields) implemented in other apps using official Android APIs. We experimentally showcase how this reuse mechanism can be leveraged to â plagiarize" supposedly-protected functionalities. Typically, we were able to leverage this mechanism to bypass security guards that a popular video broadcaster has placed for preventing access to its video database from outside its provided app. We further contribute with a static analysis toolkit, named DICIDer, for detecting direct inter-app code invocations in apps. An empirical analysis of the usage prevalence of this reuse mechanism is then conducted. Finally, we discuss the usage contexts as well as the implications of this studied reuse mechanism
Centre de recherche :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Trux
Disciplines :
Sciences informatiques
Auteur, co-auteur :
GAO, Jun ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
li, li;  Monash University > Faculty of Information Technology
KONG, Pingfan ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
BISSYANDE, Tegawendé François D Assise  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
KLEIN, Jacques  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Borrowing your enemy's arrows: the case of code reuse in android via direct inter-app code invocation
Date de publication/diffusion :
novembre 2020
Nom de la manifestation :
The 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering
Date de la manifestation :
from 06-11-2020 to 16-11-2020
Manifestation à portée :
International
Titre du périodique :
ESEC/FSE 2020: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering
Maison d'édition :
Association for Computing Machinery, New York, Etats-Unis
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Projet FnR :
FNR10621687 - Security And Privacy For System Protection, 2015 (01/01/2017-30/06/2023) - Sjouke Mauw
Disponible sur ORBilu :
depuis le 22 janvier 2021

Statistiques


Nombre de vues
209 (dont 14 Unilu)
Nombre de téléchargements
215 (dont 2 Unilu)

citations Scopus®
 
12
citations Scopus®
sans auto-citations
8
OpenCitations
 
6
citations OpenAlex
 
10
citations WoS
 
5

Bibliographie


Publications similaires



Contacter ORBilu