Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems
Title | Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Davidson, Drew, Chen, Yaohui, George, Franklin, Lu, Long, Jha, Somesh |
Conference Name | Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4944-4 |
Keywords | composability, Metrics, mobile security, Operating Systems Security, privacy, pubcrawl, Resiliency, security, Security Audits |
Abstract | A majority of today's mobile apps integrate web content of various kinds. Unfortunately, the interactions between app code and web content expose new attack vectors: a malicious app can subvert its embedded web content to steal user secrets; on the other hand, malicious web content can use the privileges of its embedding app to exfiltrate sensitive information such as the user's location and contacts. In this paper, we discuss security weaknesses of the interface between app code and web content through attacks, then introduce defenses that can be deployed without modifying the OS. Our defenses feature WIREframe, a service that securely embeds and renders external web content in Android apps, and in turn, prevents attacks between em- bedded web and host apps. WIREframe fully mediates the interface between app code and embedded web content. Un- like the existing web-embedding mechanisms, WIREframe allows both apps and embedded web content to define simple access policies to protect their own resources. These policies recognize fine-grained security principals, such as origins, and control all interactions between apps and the web. We also introduce WIRE (Web Isolation Rewriting Engine), an offline app rewriting tool that allows app users to inject WIREframe protections into existing apps. Our evaluation, based on 7166 popular apps and 20 specially selected apps, shows these techniques work on complex apps and incur acceptable end-to-end performance overhead. |
URL | http://doi.acm.org/10.1145/3052973.3052998 |
DOI | 10.1145/3052973.3052998 |
Citation Key | davidson_secure_2017 |