Visible to the public Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems

TitleSecure Integration of Web Content and Applications on Commodity Mobile Operating Systems
Publication TypeConference Paper
Year of Publication2017
AuthorsDavidson, Drew, Chen, Yaohui, George, Franklin, Lu, Long, Jha, Somesh
Conference NameProceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4944-4
Keywordscomposability, Metrics, mobile security, Operating Systems Security, privacy, pubcrawl, Resiliency, security, Security Audits
Abstract

A majority of today's mobile apps integrate web content of various kinds. Unfortunately, the interactions between app code and web content expose new attack vectors: a malicious app can subvert its embedded web content to steal user secrets; on the other hand, malicious web content can use the privileges of its embedding app to exfiltrate sensitive information such as the user's location and contacts. In this paper, we discuss security weaknesses of the interface between app code and web content through attacks, then introduce defenses that can be deployed without modifying the OS. Our defenses feature WIREframe, a service that securely embeds and renders external web content in Android apps, and in turn, prevents attacks between em- bedded web and host apps. WIREframe fully mediates the interface between app code and embedded web content. Un- like the existing web-embedding mechanisms, WIREframe allows both apps and embedded web content to define simple access policies to protect their own resources. These policies recognize fine-grained security principals, such as origins, and control all interactions between apps and the web. We also introduce WIRE (Web Isolation Rewriting Engine), an offline app rewriting tool that allows app users to inject WIREframe protections into existing apps. Our evaluation, based on 7166 popular apps and 20 specially selected apps, shows these techniques work on complex apps and incur acceptable end-to-end performance overhead.

URLhttp://doi.acm.org/10.1145/3052973.3052998
DOI10.1145/3052973.3052998
Citation Keydavidson_secure_2017