Surreptitious sharing on android
dc.contributor.author | Schürmann, Dominik | |
dc.contributor.author | Wolf, Lars | |
dc.contributor.editor | Meier, Michael | |
dc.contributor.editor | Reinhardt, Delphine | |
dc.contributor.editor | Wendzel, Steffen | |
dc.date.accessioned | 2017-06-21T07:43:30Z | |
dc.date.available | 2017-06-21T07:43:30Z | |
dc.date.issued | 2016 | |
dc.description.abstract | Many email and messaging applications on Android utilize the Intent API for sharing images, videos, and documents. Android standardizes Intents for sending and Intent Filters for receiving content. Instead of sending entire files, such as videos, via this API, only URIs are exchanged pointing to the actual storage position. In this paper we evaluate applications regarding a security vulnerability allowing privilege escalation and data leakage, which is related to the handling of URIs using the file scheme. We analyze a vulnerability called Surreptitious Sharing and present two scenarios showing how it can be exploited in practice. Based on these scenarios, 4 email and 8 messaging applications have been analyzed in detail. We found that 8 out of 12 applications are vulnerable. Guidelines how to properly handle file access on Android and a fix for the discussed vulnerability are attached. | en |
dc.identifier.isbn | 978-3-88579-650-3 | |
dc.identifier.pissn | 1617-5468 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Sicherheit 2016 - Sicherheit, Schutz und Zuverlässigkeit | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-256 | |
dc.title | Surreptitious sharing on android | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 78 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 67 | |
gi.conference.date | 5.-7. April 2016 | |
gi.conference.location | Bonn |
Dateien
Originalbündel
1 - 1 von 1