292 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author이연준-
dc.date.accessioned2020-01-07T04:34:49Z-
dc.date.available2020-01-07T04:34:49Z-
dc.date.issued2017-06-
dc.identifier.citation2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Page. 403-414en_US
dc.identifier.issn2158-3927-
dc.identifier.urihttps://ieeexplore.ieee.org/document/8023140-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/121594-
dc.description.abstractAndroid allows developers to build apps with app installation functionality themselves with minimal restriction and support like any other functionalities. Given the critical importance of app installation, the security implications of the approach can be significant. This paper reports the first systematic study on this issue, focusing on the security guarantees of different steps of the App Installation Transaction (AIT). We demonstrate the serious consequences of leaving AIT development to individual developers: most installers (e.g., Amazon AppStore, DTIgnite, Baidu) are riddled with various security-critical loopholes, which can be exploited by attackers to silently install any apps, acquiring dangerous-level permissions or even unauthorized access to system resources. Surprisingly, vulnerabilities were found in all steps of AIT. The attacks we present, dubbed Ghost Installer Attack (GIA), are found to pose a realistic threat to Android ecosystem. Further, we developed both a user-app-level and a system-level defense that are innovative and practical.en_US
dc.description.sponsorshipWe thank our reviewers for their valuable comments. This work was supported in part by National Science Foundation under grants 1223477, 1223495, 1527141, 1618493. Kai Chen was supported in part by NSFC U1536106, 61100226, Youth Innovation Promotion Association CAS, and strategic priority research program of CAS (XDA06010701). Yeonjoon Lee thanks Samsung Research America for supporting this project during his internship.en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.titleGhost installer in the shadow: Security analysis of app installation on androiden_US
dc.typeArticleen_US
dc.identifier.doi10.1109/DSN.2017.33-
dc.relation.page403-414-
dc.contributor.googleauthorLee, Yeonjoon-
dc.contributor.googleauthorLi, Tongxin-
dc.contributor.googleauthorZhang, Nan-
dc.contributor.googleauthorDemetriou, Soteris-
dc.contributor.googleauthorZha, Mingming-
dc.contributor.googleauthorWang, XiaoFeng-
dc.contributor.googleauthorChen, Kai-
dc.contributor.googleauthorZhou, Xiaoyong-
dc.contributor.googleauthorHan, Xinhui-
dc.contributor.googleauthorGrace, Michael-
dc.relation.code20170167-
dc.sector.campusE-
dc.sector.daehakCOLLEGE OF COMPUTING[E]-
dc.sector.departmentDIVISION OF COMPUTER SCIENCE-
dc.identifier.pidyeonjoonlee-
Appears in Collections:
COLLEGE OF COMPUTING[E](소프트웨어융합대학) > COMPUTER SCIENCE(소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE