Hey, You, Get Off of My Image: Detecting Data Residue in Android Images
نویسندگان
چکیده
Android’s data cleanup mechanism has been called into question with the recently discovered data residue vulnerability. However, the existing study only focuses on one particular Android version and demands heavy human involvement. In this project, we aim to fill the gap by providing a comprehensive understanding of the data residue situation across the entire Android ecosystem. To this end, we propose ANRED1, an ANdroid REsidue Detector that performs static analysis on Android framework bytecode and automatically quantifies the risk for each identified data residue instance within collected system services. The design of ANRED has overcome several challenges imposed by the special characteristic of Android framework and data residue vulnerability. We have implemented ANRED in WALA and further evaluated it against 606 Android images. The analysis results have demonstrated the effectiveness, efficiency and reliability of ANRED. In particular, we have confirmed the effect of vendor customization and version upgrade on data residue vulnerability. We have also identified five new data residue instances that have been overlooked in the previous study, leading to data leakage and privilege escalation attacks.
منابع مشابه
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
In this paper, we present a systematic study for the detection of malicious applications (or apps) on popular Android Markets. To this end, we first propose a permissionbased behavioral footprinting scheme to detect new samples of known Android malware families. Then we apply a heuristics-based filtering scheme to identify certain inherent behaviors of unknown malicious families. We implemented...
متن کاملHey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers
Password managers aim to help users manage their ever increasing number of passwords for online authentication. Since users only have to memorise one master secret to unlock an encrypted password database or key chain storing all their (hopefully) different and strong passwords, password managers are intended to increase username/password security. With mobile Internet usage on the rise, passwo...
متن کاملSingular Value Decomposition based Steganography Technique for JPEG2000 Compressed Images
In this paper, a steganography technique for JPEG2000 compressed images using singular value decomposition in wavelet transform domain is proposed. In this technique, DWT is applied on the cover image to get wavelet coefficients and SVD is applied on these wavelet coefficients to get the singular values. Then secret data is embedded into these singular values using scaling factor. Different com...
متن کاملDetection of Microaneurysms in Retinal Angiography Images Using the Circular Hough Transform
This paper presents an automated method for detecting microaneurysms in the retinal angiographic images by using image processing techniques. In the presented method, in order to fade or remove the pseudo images, first retinal images are pre-processed. Then microaneurysms are identified by circular Hough transform. In the existing methods of dete...
متن کاملDetection of Microaneurysms in Retinal Angiography Images Using the Circular Hough Transform
This paper presents an automated method for detecting microaneurysms in the retinal angiographic images by using image processing techniques. In the presented method, in order to fade or remove the pseudo images, first retinal images are pre-processed. Then microaneurysms are identified by circular Hough transform. In the existing methods of dete...
متن کامل