Visible to the public An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps

TitleAn Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps
Publication TypeConference Paper
Year of Publication2016
AuthorsIkram, Muhammad, Vallina-Rodriguez, Narseo, Seneviratne, Suranga, Kaafar, Mohamed Ali, Paxson, Vern
Conference NameProceedings of the 2016 Internet Measurement Conference
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4526-2
Keywordsads blocking, Collaboration, composability, dns hijacking, hidden proxies, IPv6, ipv6 security, javascript injection, Metrics, pubcrawl, Resiliency, tls interception, tunneling protocols, vpn, vpn permission
Abstract

Millions of users worldwide resort to mobile VPN clients to either circumvent censorship or to access geo-blocked content, and more generally for privacy and security purposes. In practice, however, users have little if any guarantees about the corresponding security and privacy settings, and perhaps no practical knowledge about the entities accessing their mobile traffic. In this paper we provide a first comprehensive analysis of 283 Android apps that use the Android VPN permission, which we extracted from a corpus of more than 1.4 million apps on the Google Play store. We perform a number of passive and active measurements designed to investigate a wide range of security and privacy features and to study the behavior of each VPN-based app. Our analysis includes investigation of possible malware presence, third-party library embedding, and traffic manipulation, as well as gauging user perception of the security and privacy of such apps. Our experiments reveal several instances of VPN apps that expose users to serious privacy and security vulnerabilities, such as use of insecure VPN tunneling protocols, as well as IPv6 and DNS traffic leakage. We also report on a number of apps actively performing TLS interception. Of particular concern are instances of apps that inject JavaScript programs for tracking, advertising, and for redirecting e-commerce traffic to external partners.

URLhttp://doi.acm.org/10.1145/2987443.2987471
DOI10.1145/2987443.2987471
Citation Keyikram_analysis_2016