Detecting Hidden Attacks through the Mobile App-Web Interfaces Yan Chen Lab of Internet and Security Technology (LIST) Northwestern University, USA.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

By Hiranmayi Pai Neeraj Jain
Parameter Tampering. Attacking the Ecommerce Shopping Cart In the above image we see that a user who wants to purchase a Television visits an online Store.
Understanding and Detecting Malicious Web Advertising
7 Effective Habits when using the Internet Philip O’Kane 1.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Free Software Alternatives: Avast! Anti-virus
TRIRIGA Anywhere 10.4 Beta Registration Steps
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Verma - ICISS 2014 R easoning M ining NLP Defense Rakesh M. Verma ReMiND Laboratory Catching Classical and Hijack-based Phishing Attacks.
The Internet & The World Wide Web Notes
Mobile App Monetization: Understanding the Advertising Ecosystem Vaibhav Rastogi.
A presentation created by David C.
Android Application Development 2013 PClassic Chris Murphy 1.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Chapter 9 Collecting Data with Forms. A form on a web page consists of form objects such as text boxes or radio buttons into which users type information.
Chapter 1: Voilà! Meet the Android. Smartphones –Can browse the Web –Allow you to play games –Use business applications –Check –Play music –Record.
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
Lecturer: Ghadah Aldehim
Getting The Most Out of Your Business Website Insert Your Logo.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Cyber Crimes.
Presented by: Kushal Mehta University of Central Florida Michael Spreitzenbarth, Felix Freiling Friedrich-Alexander- University Erlangen, Germany michael.spreitzenbart,
TERMINALFOUR SiteManager Introduction January, 2014.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Staying Safe Online Keep your Information Secure.
Chapter 6 The World Wide Web. Web Pages Each page is an interactive multimedia publication It can include: text, graphics, music and videos Pages are.
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories Mona Gandhi Markus Jakobsson Jacob Ratkiewicz Indiana University at Bloomington Presented.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
London April 2005 London April 2005 Creating Eyeblaster Ads The Rich Media Platform The Rich Media Platform Eyeblaster.
CS378 - Mobile Computing Intents.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Copyright © 2002 Pearson Education, Inc. Slide 8-1.
Online Marketing communications. Learning Objectives Identify the major forms of online marketing communications Discuss the ways in which a Web site.
Securing Embedded User Interfaces: Android and Beyond Franziska Roesner and Tadayoshi Kohno University of Washington Mohamed Grissa A presentation of USENIX.
CS378 - Mobile Computing Intents. Allow us to use applications and components that are part of Android System – start activities – start services – deliver.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
MODULE 3 Internet Basics © Paradigm Publishing, Inc.1.
XP Browser and Basics COM111 Introduction to Computer Applications.
IPSOS / Vodafone / Novartis Kenya 17 December 2014.
1 Mezzanine Ware (Pty) Ltd © 2014 Installing\Uninstalling the Mezzanine Helium Android application.
DO NOW (while you're waiting!) ‏ If you don't have a QR code reader on your phone, go to your apps store and search for a free one (try just “qr”). Download.
Terms – Online Advertising Banner ads - embedding an ad into a web page – known as a click through due to interactive actions where the consumer clicks.
DIGITAL ADVERTISING Standard 4. THE ROLE OF DIGITAL ADVERTISING IS TO INCREASE SALES OR IMPROVE BRAND AWARENESS.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Productivity Applications.
Preparing Your Apps for Publication Test your app thoroughly on a variety of devices. The app might work perfectly using the emulator on your.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
WHAT THE APP IS THAT? DECEPTION AND COUNTERMEASURES IN THE ANDROID USER INTERFACE.
What mobile ads know about mobile users
Escalation Of Ad Wars Boosts Malware Delivery
Detecting Hidden Attacks through the Mobile App-Web Interfaces
File Management in the Cloud
Are these ads safe? Detecting hidden attacks through the mobile app-web interface Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan.
Are these Ads Safe: Detecting Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, and Ryan Riley.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Swipe to Donate Life.
Network Profiler: Towards Automatic Fingerprinting of Android Apps
MyLion Registration Website | Mobile device
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Kaspersky Social Channel
Presentation transcript:

Detecting Hidden Attacks through the Mobile App-Web Interfaces Yan Chen Lab of Internet and Security Technology (LIST) Northwestern University, USA

Motivation Downloaded phishing app Scan Automatically Click on the buttons

Motivation Vast effort has been spent analyzing the malicious apps themselves – For both industry and academia An important, yet unexplored vector of malware propagation is benign, legitimate apps that lead users to websites hosting malicious apps We call this hidden attacks though the app- web interface

Contributions Develop a framework for analyzing the app-web interfaces in Android applications Develop a novel technique to interact with UI widgets to trigger app-web interface Conduct a systematic study to associate ad networks with ad library packages Detect hidden attacks – Tested 600,000 apps in two months – Found several unknown attacks: a rogue antivirus scam, free iPad and iPhone scams, and ads propagating SMS trojans

Outline Background on mobile advertising System Design Detection Results Case study

Advertising Overview 6

Publishers and Advertisers Publishers – show ads to users Advertisers – the brand owners that wish to advertise 7

Ad networks Also called aggregators Link advertisers to publishers Buy ad space from publishers; sell to advertisers Sophisticated algorithms for – Targeting – Inventory management 8

Ad networks Ad networks may interface with each other Syndication – One ad network asks another to fill ad space Ad exchange – Real time auction of ad inventory – Bidding from many ad networks for many ad spaces

Mobile In-app Advertising Ad networks provide glue code that apps can embed and communicate with ad servers – Ad libraries, which identify ad networks Web links embedded directly in apps Malicious links are visited via the landing pages of ads coming from ad networks – Though the apps themselves are benign

Outline Background on mobile advertising System Design Detection Results Case study

Overview of Detection Methodology App DataSet Trigger App- web interfaces WEBSITE Landing Pages URL scanning Dynamic webpage analysis File scanning Malware and scan report Downloaded Files Dynamic App Analysis Redirection Chains

Components Triggering – Interact with the app to launch web links Detection – Include the various processes to detect malicious and benig that may occur as a result of triggering Provenance – Understand the cause or origin of a detected malicious activity, and attribute events to a specific domain or an ad library

Triggering App-Web interfaces Application UI Exploration – Use the heuristics and algorithms developed in AppsPlayground [Codaspy2013] Handling Webviews – Develop based on Selendroid to interact with Webviews – Apply computer vision techniques

UI Exploration of AppsPlayground

Examples of Handling Webviews  Bounding boxes are depicted as red rectangles.  The top two figures contain the whole screen while the bottom figure is just an ad.  Note the detection of buttons.

Detection Redirection chains Landing pages – In a browser configured with a realistic user agent and window size – Download any files that can be downloaded File and URL scanning – VirusTotal URL blacklists Google Safebrowsing, Websense, … – VirusTotal antivirus engines Symantec, Dr. Web, Kaspersky, Eset, …

Provenance Understand the cause and origins of attacks Approach 1: through redirection chains – Identify the parties owning the URLs leading up to the landing URL Approach 2: attribute code-level elements to locate it: at app or ad libraries?

Discovering Ad Networks First systematic step towards understanding malvertising Finding ad libraries – Typically have their own Java packages, e.g., com.google.ads – Disassemble the app and get Java packages

Approach 1 Find frequent packages Ad networks included in many apps so their packages will be frequent So are some other packages, e.g., Apache libs, game development libs,… Have to manually filter them

Approach 2 Observation: Ad functionality is different from the main app functionality Three steps  Get all android APIs  Decouple: Break the app into different modules based on code characteristics  Inheritance, function calls, field relationships  Cluster: cluster modules from multiple apps together based on their API call similarity  Frequent libs such as Apache, game libs  ad libraries

Approach 2 APP1 Module APP2 Module APPn Module Cluster 1 Cluster m Cluster 2 Decoupling Clustering Google ads libs Apache libs Game libs

Discovering Ad Networks: Results Dataset – 492,534 apps from Google Play – 422,505 apps from four Chinese stores: 91, Anzhi ( 安智 ), AppChina( 应用汇 ), Mumayi ( 木蚂蚁 ) Discovered a total of 201 ad networks – The most reported ad networks so far

Outline Background on mobile advertising System Design Detection Results Case study

Overall Detection Findings Google PlayChinese Markets App-to-web links 1,000,000415,000 Malicious URLs Downloaded Files Malicious Downloaded Files Run 492,534 apps from Google Play and 200,000 apps from Chinese markets, having ad libraries

Which Ad Libraries Have Attacks  Malicious files downloaded through ad libraries and other links.  Tapcontext malware has the most malicious file download, but we exclude them here for better viewing Google Play Chinese market

Comparison on Redirection Chains Google PlayChinese market  As the length of the chains increase, the two curves come closer  We have a greater fraction of malicious chains when they are longer

Outline Background on mobile advertising System Design Detection Results Case study

Case Study:Fake AV scam  Campaign found in multiple apps, one network: Tapcontext (244 instances in America and 102 in China)  Website design mimics Android dialog box  We detected this campaign 20 days before the site was flagged as phishing by Google and others

Case Study:Free iPad scam Click on the button Landing Page  Phishing: asked to give some very personal information without getting anything in return  After that, receiving spam on our address registered with this ad

Case Study:Free iPad scam  The scam originates not through an ad in the app, but through a link statically embedded in the app.

Case Study: Downloaded Player  Ad library name: jp.co.nobot  It leads to download a video player  The purported video player is actually an SMS trojan  Automatically send out paid SMS? Click on the ad Download player

Case Study: SMS Trojan 1/24/2016  When opening the app, it will try to send a message directly  Once click on the "send" button, it will send message to (a charged SMS service)  Receive warning on a Xiaomi phone

1/24/2016 Case Study: Porn Phishing  It also asks you to pay 15 RMB to register a member to see porn content

1/24/2016 Case Study: 禁播视频  Get your location  Send SMS to  Download several malicious apps directly  Some get installed directly without prompt

Conclusions Explored the app-web interface, wherein a user may go from an app to a Web destination via ad or web links embedded in the app Tested 600,000 applications in two months Identified several malware and scam campaigns propagating through both ads and web links in apps. We are working with CNCERT to protect Android users – by screening out offending apps that embed links leading to malicious content – by making ad networks more accountable for their ad content

Thank you ! Questions ?

Android Ecosystem

Button Detection Algorithm a.Perform edge detection on the view’s image b.Find contours in the image c.Ignore the non-convex contours or those with very small area d.Compute the bounding boxes of all remaining contours

Case Study:Downloaded App  Malicious apps downloaded from Baidu ads  Sent message directly to 12114