All Your App Links are Belong to Us: Understanding the Threats of Instant Apps based Attacks
2020-11
会议录名称THE ACM JOINT EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE)
发表状态已发表
DOI10.1145/3368089.3409702
摘要

Android deep link is a URL that takes users to a specific page of a mobile app, enabling seamless user experience from a webpage to an app. Android app link, a new type of deep link introduced in Android 6.0, is claimed to offer more benefits, such as supporting instant apps and providing more secure verification to protect against hijacking attacks that previous deep links can not. However, we find that the app link is not as secure as claimed, because the verification process can be bypassed by exploiting instant apps.

In this paper, we explore the weakness of the existing app link mechanism and propose three feasible hijacking attacks. Our findings show that even popular apps are subject to these attacks, such as Twitter, Whatsapp, Facebook Message. Our observation is confirmed by Google. To measure the severity of these vulnerabilities, we develop an automatic tool to detect vulnerable apps, and perform a large-scale empirical study on 400,000 Android apps.

Experiment results suggest that app link hijacking vulnerabilities are prevalent in the ecosystem. Specifically, 27.1% apps are vulnerable to link hijacking with smart text selection (STS); 30.0% apps are vulnerable to link hijacking without STS, and all instant apps are vulnerable to instant app attack. We provide an in-depth understanding of the mechanisms behind these types of attacks. Furthermore, we propose the corresponding detection and defense methods that can successfully prevent the proposed hijackings for all the evaluated apps, thus raising the bar against the attacks on Android app links. Our insights and findings demonstrate the urgency to identify and prevent app link hijacking attacks.

关键词Android Deep Link App Link Instant app
收录类别EI ; CPCI ; CPCI-S
引用统计
正在获取...
文献类型会议论文
条目标识符https://kms.shanghaitech.edu.cn/handle/2MSLDSTB/123625
专题信息科学与技术学院_PI研究组_唐宇田组
通讯作者Luo,Xiapu
作者单位
1.ShanghaiTech University
2.University of Technology Sydney
3.Beijing University of Posts and Telecommunications
4.The Hong Kong Polytechnic University
5.Chongqing University
第一作者单位上海科技大学
第一作者的第一单位上海科技大学
推荐引用方式
GB/T 7714
Tang,Yutian,Sui,Yulei,Wang,Haoyu,et al. All Your App Links are Belong to Us: Understanding the Threats of Instant Apps based Attacks[C],2020.
条目包含的文件
文件名称/大小 文献类型 版本类型 开放类型 使用许可
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Tang,Yutian]的文章
[Sui,Yulei]的文章
[Wang,Haoyu]的文章
百度学术
百度学术中相似的文章
[Tang,Yutian]的文章
[Sui,Yulei]的文章
[Wang,Haoyu]的文章
必应学术
必应学术中相似的文章
[Tang,Yutian]的文章
[Sui,Yulei]的文章
[Wang,Haoyu]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。