Tapjacking Threats and Mitigation Techniques for Android Applications
نویسندگان
چکیده
With the increased dependency on web applications through mobile devices, malicious attack techniques have now shifted from traditional web applications running on desktop or laptop (allowing mouse click-based interactions) to mobile applications running on mobile devices (allowing touch-based interactions). Clickjacking is a type of malicious attack originating in web applications, where victims are lured to click on seemingly benign objects in web pages. However, when clicked, unintended actions are performed without the user’s knowledge. In particular, it is shown that users are lured to touch an object of an application triggering unintended actions not actually intended by victims. This new form of clickjacking on mobile devices is called tapjacking. Much of the research work has focused on developing mitigation techniques on web application level clickjacking issue. However, none of the research has thoroughly investigated attacks and mitigation techniques due to tapjacking in mobile devices. In this thesis, we identify coding practices that can be helpful for software practitioners to avoid malicious attacks and define a detection techniques to prevent the consequence of malicious attacks for the end users. We first find out where tapjacking attack type falls within the broader literature of malware, in particular for Android malware. In this direction, we propose a classification of Android malware. Then, we propose a novel technique based on Kullback-Leibler Divergence (KLD) to identify possible tapjacking behavior in applications. We validate the approach with a set of benign and malicious android applications. We also implemented a prototype tool for detecting tapjacking attack symptom using the KLD based measurement. The evaluation results show that tapjacking can be detected effectively with KLD. This thesis is organized in the following format: a classification of Android malware, a survey of mitigation techniques, a discussion of our proposed KLD-Based approach, and an application implementation.
منابع مشابه
An Investigation of the Android/badaccents Malware Which Exploits a New Android Tapjacking Attack an Investigation of the Android/badaccents Malware Which Exploits a New Android Tapjacking Attack
We report on a new threat campaign, underway in Korea, which infected around 20,000 Android users within two months. The campaign attacked mobile users with malicious applications spread via di↵erent channels, such as email attachments or SMS spam. A detailed investigation of the Android malware resulted in the identification of a new Android malware family Android/BadAccents. The family repres...
متن کاملAndroid Tapjacking Vulnerability
Android is an open source mobile operating system that is developed mainly by Google. It is used on a significant portion of mobile devices worldwide. In this paper, I will be looking at an attack commonly known as tapjacking. I will be taking the attack apart and walking through each individual step required to implement the attack. I will then explore the various payload options available to ...
متن کاملHow Current Android Malware Seeks to Evade Automated Code Analysis
First we report on a new threat campaign, underway in Korea, which infected around 20,000 Android users within two months. The campaign attacked mobile users with malicious applications spread via different channels, such as email attachments or SMS spam. A detailed investigation of the Android malware resulted in the identification of a new Android malware family Android/BadAccents. The family...
متن کاملLiterature Analysis on Malware Detection
Usage of Android smartphones is more as compared to another smartphones due to its Open Source Operating System. Due to its Open OS, Android enables us to install third party applications. However, Security is one of the main concerns in Android. Security threats of malicious applications are rapidly increasing due to the nature of the third party applications where only developers can assign r...
متن کاملEvaluating Android Anti-malware against Transformation Attacks
Mobile malware threats (e.g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile malware threats but a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014