Are these Ads Safe: Detecting Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley.

Slides:



Advertisements
Similar presentations
Understanding and Detecting Malicious Web Advertising
Advertisements

PHAD- A Phishing Avoidance and Detection Tool Using Invisible Digital Watermarking By Sonali Batra Web 2.0 Security and Privacy 2014.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
JShield: Towards Real-time and Vulnerability-based Detection of Polluted Drive-by Download Attacks Yinzhi Cao*, Xiang Pan**, Yan Chen** and Jianwei Zhuge***
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
The Internet & The World Wide Web Notes
Mobile App Monetization: Understanding the Advertising Ecosystem Vaibhav Rastogi.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Presented by: Kushal Mehta University of Central Florida Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander- University Erlangen, Germany michael.spreitzenbart,
INTRODUCTION TO FRONTPAGE. TOPICS TO BE DISCUSSED……….  Introduction Introduction  Features Features  Starting Front Page Starting Front Page  Components.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
Chapter 6 The World Wide Web. Web Pages Each page is an interactive multimedia publication It can include: text, graphics, music and videos Pages are.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
London April 2005 London April 2005 Creating Eyeblaster Ads The Rich Media Platform The Rich Media Platform Eyeblaster.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Security Games in Online Advertising: Can Ads Help Secure the Web? JP Hubaux Joint work with N. Vratonjic, M. Raya, and D. Parkes.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Chapter 8 Collecting Data with Forms. Chapter 8 Lessons Introduction 1.Plan and create a form 2.Edit and format a form 3.Work with form objects 4.Test.
Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Reading Flash. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also choose some.
Terms – Online Advertising Banner ads - embedding an ad into a web page – known as a click through due to interactive actions where the consumer clicks.
Detecting Hidden Attacks through the Mobile App-Web Interfaces Yan Chen Lab of Internet and Security Technology (LIST) Northwestern University, USA.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
WHAT THE APP IS THAT? DECEPTION AND COUNTERMEASURES IN THE ANDROID USER INTERFACE.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Terms – Online Advertising
Advanced HTML Tags:.
Detecting Hidden Attacks through the Mobile App-Web Interfaces
IT Security Awareness Day October 19, 2016
BUILD SECURE PRODUCTS AND SERVICES
CSCE 548 Student Presentation Ryan Labrador
Information Systems for Managers Assignment FACEBOOK
Marking the Most of the Web’s Resources
Chapter 7 E-commerce Marketing Communications. Chapter 7 E-commerce Marketing Communications.
PIWIK JUNIOR TIDAL ASSOCIATE PROF., WEB SERVICES & MULTIMEDIA LIBRARIAN NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY.
8 Steps to Facebook Ad Creating & Conversion Tracking Set-up
Native Ads by YeahMobi.
Automated Experiments on Ad Privacy Settings
Are these ads safe? Detecting hidden attacks through the mobile app-web interface Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan.
Joe’s Spaza Case Study BluwinMobi Copy Right 2011.
Mobile Application Development
Data Interface Module Leighton Wingerd & Manisha Kollu
EBSCO eBooks.
3.04 Understand the use of direct marketing to attract attention and to build a brand.
Latest Updates on BlackHawk Mines Music : Privacy Policy
Chapter 18 MobileApp Design
King Phisher Diy phishing security
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms.
Webroot Product Key code for Serial Key Activation
Sport Clips Google Analytics for Franchisee - June 2017
Malicious Advertisements
Introduction for Parents
Lab for Internet and Security Technology Yan Chen
Analyzing WebView Vulnerabilities in Android Applications
Directions: GO THROUGH THE FOLLWING SLIDES. Make sure you have quizlet cards for all the vocabulary. Study the terms GCFLearnFree website “Computer Basics”:
Have you downloaded the latest PCCP Mobile app yet?
Use of Electronic and Internet advertising options
Mobile App Advertisements
Digital Literacy 1.00 Computer Basics
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Cross Site Request Forgery (CSRF)
Presentation transcript:

Are these Ads Safe: Detecting Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley 姓名:应臣浩 学号:016033910030

Consider This…

Consider This…

The Problem Enormous effort toward analyzing malicious applications App may itself be benign But may lead to malicious content through links App-web interface Links inside the app leading to web-content Not well-explored Types Advertisements Other links in app

Outline App-Web Interface Characteristics Solution Results Conclusion

Outline App-Web Interface Characteristics Solution Results Conclusion

App-Web Interface Characteristics Can be highly dynamic A link may recursively redirect to another before leading to a final web page Links embedded in apps Can be dynamically generated Can lead to dynamic websites Advertisements Ad libraries create links dynamically Ad economics can lead to complex redirection chains

Advertising Overview

Ad Networks Ad libraries act as the interface between apps and ad network servers It is some embed code from ad networks It manages and serves advertisement Ad networks may interface with each other Syndication – One network asks another to fill ad space Ad exchange – Real-time auction of ad space

Outline App-Web Interface Characteristics Solution Results Conclusion 10

Solution Components Triggering: Interact with app to launch web links Detection: Process the results to identify malicious content Provenance: Identify the origin of a detected malicious activity Attribute malicious content to domains and ad networks

Solution Architecture

Triggering Use AppsPlayground1 A gray box tool for app UI exploration Extracts features from displayed UI and iteratively generates a UI model A novel computer graphics-based algorithm for identifying buttons See widgets and buttons as a human would 1Rastogi, Vaibhav, Yan Chen, and William Enck. "AppsPlayground: automatic security analysis of smartphone applications.” In Proceedings of the third ACM conference on Data and application security and privacy, pp. 209-220. ACM, 2013.

Detection Automatically download content from landing pages Use VirusTotal for detecting malicious files and URLs

Provenance How did the user come across an attack? Code-level attribution App code Ad libraries Identified 201 ad libraries Redirection chain-level attribution Which URLs led to attack page or content

Outline App-Web Interface Characteristics Solution Results Conclusion

Results Deployments in US and China 600 K apps from Google Play and Chinese stores 1.4 M app-web links triggered 2,423 malicious URLs 706 malicious files

Case Study: Fake AV Scam Multiple apps, one ad network: Tapcontext Ad network solely serving this scam campaign Phishing webpages detected by Google and other URL blacklists about 20 days after we detected first instance

Case Study: Free iPad Scam Asked to give personal information without any return Origins at Mobclix and Tapfortap Ad exchanges Neither developers nor the primary ad networks likely aware of this

Case Study: iPad Scam from static link Another Scam, this time through a static link embedded in app Link target opens in browser and redirects to scam Not affiliated with Facebook 20

Case Study: SMS Trojan Video Player Ad from nobot.co.jp leads to download a movie player Player sends SMS messages to a premium number without user consent Click on ad

Outline App-Web Interface Characteristics Solution Results Conclusion

Limitations Incomplete detection Incomplete triggering Antiviruses and URL blacklists are not perfect Incomplete triggering App UI can be very complex May still be sufficient to capture advertisements

Conclusion Benign apps can lead to malicious content Provenance makes it possible to identify responsible parties Can provide a safer landscape for users Screening offending applications Holding ad networks accountable for content

Future Work Speeding up collection of ads Goals of analyzing an order of magnitude more ads in shorter time

Thank you!