SlideShare a Scribd company logo
Revealing Android 3PLs -based attacks
Amina Waddiz
Supervised by: Prof. Jong Kim
Mentored by: Beumjin Cho
August 27th, 2015
Summary
1. Introduction
2. Motivation, Goals and Contribution
3. 3PLs Classification and usage
4. 3PLs-based attacks
5. Conclusion
Introduction
Android Security Model
DAC/MAC
MAC: Permission-based
3PLs+App
Same process
Same permissions
Android: Attack surface
Current state: Ad Libs
Other libs ?
Motivation & Goals
Motivation:
→ Protect the User privacy
→ Defend the System safety
Goals:
→ Generalize 3PLs usage
→ Identify 3PLs-based attacks
Background
Android app and permissions
Android System
External Server
3PLs
App
Contribution
- Classification
- Usage
- 3PLs-based
attacks
Android System
External Server
3PLs
App
Contribution (1)
- Classification
- Usage
- 3PLs-based
attacks
Overview of existing 3PLs
Revealing Android 3PLs-based attacks
1. Build.gradle
2. Activity.xml
3. AndroidManifest
4. Calls in java Classes
3PLs typical usage
Android System
External Server
3PLs
App
Contribution (2)
- Classification
- Usage
- 3PLs-based
attacks
Attack Example: Steal sensitive data
Category Description Examples
Functional
Classification
Privacy User’s sensitive data - Contacts
- Location
- Phone identity
Financial
Damage
Make revenue -Premium
SMS/Calls
-Online Banking
Frauds
Device Usability Damage device
utilities
- Drain Battery
- Lock the screen
Agent-based
Classification
Memory Access memory
stack and heap
- Bus Monitoring
attack
Network GSM networks
(Local stations not
device)
- Attach Flood
(Denial of service)
Overview of 3PLs-based attacks
Conclusion
● An analysis and classification for Android 3PLs
and their threat:
○ Collected, studied and classified the most used 3PLs
in android apps
○ Unveiled 3PLs-based threats attacking some android
components
● Necessity of a novel approach to tackle 3PLs-
based malware:
○ Build an efficient tool to ISOLATE 3PLs from the host
application

More Related Content

PPTX
VMRay intro video
PPTX
Analysis of Field Data on Web Security Vulnerabilities
PPTX
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
PPTX
I’m going to go... stalk... Lenny and Carl...
PDF
Vulnerability
PPT
Scanning web vulnerabilities
PPTX
Invincea fake british airways ticket spear-phish malware 03-21-2014
PDF
[PDF] Penetration Testing: A Hands-On Introduction to Hacking
VMRay intro video
Analysis of Field Data on Web Security Vulnerabilities
Tech ThrowDown: Invincea FreeSpace vs EMET 5.0
I’m going to go... stalk... Lenny and Carl...
Vulnerability
Scanning web vulnerabilities
Invincea fake british airways ticket spear-phish malware 03-21-2014
[PDF] Penetration Testing: A Hands-On Introduction to Hacking

Similar to Revealing Android 3PLs-based attacks (20)

PDF
Detection of Android Third Party Libraries based attacks
PDF
20160831_app_storesecurity_Seminar
PPTX
Getting started with android
PDF
Getting started with Android pentesting
PPTX
Android security
PDF
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
DOCX
Mitigating Privilege-Escalation Attacks on Android Report
PDF
Final_Presentation_FlowDroid
PPTX
Unit-2 Network Security Concepts (1).pptx
PPTX
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
PPTX
Advanced Threat Protection - Sandboxing 101
PDF
Android security
PDF
Android security
PDF
OS-Project-Report-Team-8
PDF
Android open-source operating System for mobile devices
PPT
MIT-6-determina-vps.ppt
PPTX
Mobile application security
PPTX
Mobile Application Security
PPTX
Untitled 1
PDF
Mobile_Security_From_The_BYOD_Viewpoint.pdf
Detection of Android Third Party Libraries based attacks
20160831_app_storesecurity_Seminar
Getting started with android
Getting started with Android pentesting
Android security
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
Mitigating Privilege-Escalation Attacks on Android Report
Final_Presentation_FlowDroid
Unit-2 Network Security Concepts (1).pptx
The Lazy Attacker: Defending Against Broad-based Cyber Attacks
Advanced Threat Protection - Sandboxing 101
Android security
Android security
OS-Project-Report-Team-8
Android open-source operating System for mobile devices
MIT-6-determina-vps.ppt
Mobile application security
Mobile Application Security
Untitled 1
Mobile_Security_From_The_BYOD_Viewpoint.pdf
Ad

Revealing Android 3PLs-based attacks