Broken Fingers: On the Usage of the Fingerprint API in Android
نویسندگان
چکیده
Smartphones are increasingly used for very important tasks such as mobile payments. Correspondingly, new technologies are emerging to provide better security on smartphones. One of the most recent and most interesting is the ability to recognize fingerprints, which enables mobile apps to use biometric-based authentication and authorization to protect security-sensitive operations. In this paper, we present the first systematic analysis of the fingerprint API in Android, and we show that this API is not well understood and often misused by app developers. To make things worse, there is currently confusion about which threat model the fingerprint API should be resilient against. For example, although there is no official reference, we argue that the fingerprint API is designed to protect from attackers that can completely compromise the untrusted OS. After introducing several relevant threat models, we identify common API usage patterns and show how inappropriate choices can make apps vulnerable to multiple attacks. We then design and implement a new static analysis tool to automatically analyze the usage of the fingerprint API in Android apps. Using this tool, we perform the first systematic study on how the fingerprint API is used. The results are worrisome: Our tool indicates that 53.69% of the analyzed apps do not use any cryptographic check to ensure that the user actually touched the fingerprint sensor. Depending on the specific use case scenario of a given app, it is not always possible to make use of cryptographic checks. However, a manual investigation on a subset of these apps revealed that 80% of them could have done so, preventing multiple attacks. Furthermore, the tool indicates that only the 1.80% of the analyzed apps use this API in the most secure way possible, while many others, including extremely popular apps such as Google Play Store and Square Cash, use it in weaker ways. To make things worse, we find issues and inconsistencies even in the samples provided by the official Google documentation. We end this work by suggesting various improvements to the fingerprint API to prevent some of these problematic attacks.
منابع مشابه
Mining usage patterns for the Android API
API methods are not used alone, but in groups and following patterns. However, despite being a key information for API users, most usage patterns are not described in official API documents. In this article, we report a study that evaluates the feasibility of automatically enriching API documents with information on usage patterns. For this purpose, we mine and analyze 1,952 usage patterns, fro...
متن کاملComparative Dermatoglyphic Study between Autistic Patients and Normal People in Iran
Autism is a neurodevelopmental disorder originating from early childhood; nevertheless, its diagnosis is in older ages. In addition to heredity, environmental factors are also of great significance in the etiology of the disease. Dermatoglyphic patterns, albeit varied, remain stable for a lifetime and yield a large number of patterns upon examination. Studies have shown a significant associatio...
متن کاملHacking Mobile Phones Using 2D Printed Fingerprints
Fingerprint is the most popular biometric trait due to the perceived uniqueness and persistence of friction ridge pattern on human fingers [1]. Following the introduction of iPhone 5S with Touch ID fingerprint sensor in September 2013, most of the mobile phones, such as iPhone 5s/6/6+, Samsung Galaxy S5/S6, HTC One Max, Huawei Honor 7, Meizu MX4 Pro and others, now come with embedded fingerprin...
متن کاملTCPSnitch: Dissecting the Usage of the Socket API
Networked applications interact with the TCP/IP stack through the socket API. Over the years, various extensions have been added to this popular API. In this paper, we propose and implement the TCPSnitch software that tracks the interactions between Linux and Android applications and the TCP/IP stack. We collect a dataset containing the interactions produced by more than 120 different applicati...
متن کاملSummarizing Control Flow of Callbacks for Android API Methods
Ensuring the reliability and security of Android apps is important considering the large Android market and the critical usage of Android apps. To analyze and test Android apps, we need to know program paths, i.e., the control flow of callbacks implemented in the apps. One of the challenges to identify such information is the extensive use of the Android API methods in the apps. These methods c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017