Download presentation
Presentation is loading. Please wait.
Published byStanley Jackson Modified over 8 years ago
1
2011/12/20 YLJ@adlab 1 Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, and Heng Yin Syracuse University ACSAC 2011
2
Agenda Introduction WebView Threat Models Attacks from Web Pages Attack from Malicious Apps Case Studies Conclusion 2011/12/20 YLJ@adlab 2
3
Introduction WebView - enabling smartphone and tablet (both in Android & iOS) apps to embed a simple but powerful browser inside them WebView Two Web's security infrastructure are weakened Trusted Computing Base (TCB) at the client side Trusted Computing Base (TCB) Sandbox protection implemented by browsers 2011/12/20 YLJ@adlab 3
4
Introduction Two objectives of Sandbox: Same-Origin Policy(SOP) Same-Origin Policy(SOP) Isolate web pages from the system and isolate the web pages of one origin from those of another 2011/12/20 YLJ@adlab 4
5
WebView(1/4) WebView is a subclass of View, and it is used to display web pages It enables apps to interact with the web content through its APIs From apps to web pages From web pages to apps three types of interactions Event monitoring Invoke Java from JavaScript Invoke JavaScript from Java 2011/12/20 YLJ@adlab 5
6
WebView(2/4) Event monitoring 2011/12/20 YLJ@adlab 6
7
WebView(3/4) Invoke Java from JavaScript 2011/12/20 YLJ@adlab 7
8
WebView(4/4) Invoke JavaScript from Java 2011/12/20 YLJ@adlab 8
9
Threat Models Attacks from Malicious Web Pages 2011/12/20 YLJ@adlab 9
10
Threat Models Attacks from Malicious Apps 2011/12/20 YLJ@adlab 10
11
Attacks from Web Pages(1/3) Through holes on the sandbox all pages loaded in the WebView can call the same interface DroidGap DroidGap Still need permission 2011/12/20 YLJ@adlab 11
12
Attacks from Web Pages(2/3) Through Frame Confusion 2011/12/20 YLJ@adlab 12 Public class CameraLauncher{ public void failPicture(String paramString){
13
Attacks from Web Pages(3/3) Through Frame Confusion 2011/12/20 YLJ@adlab 13
14
Attack from Malicious Apps(1/3) JavaScript Injection Event Sniffing and Hijacking 2011/12/20 YLJ@adlab 14
15
Attack from Malicious Apps(2/3) JavaScript Injection Android app can inject arbitrary JavaScript code into the pages loaded by the WebView component. Extracting Information From WebView 2011/12/20 YLJ@adlab 15
16
Attack from Malicious Apps(3/3) Event Sniffing and Hijacking WebView exposes an umber of hooks to Android apps, allowing them to intercept events, and potentially change the consequences of events. redirct URL 2011/12/20 YLJ@adlab 16
17
Case Studies The goal is not to look for malicious or vulnerable apps, but instead to study how Android apps use WebView. Usage of WebViewUsage of WebView Usage of the WebView Hooks Usage of the WebView Hooks Usage of addJavascriptInterface Usage of addJavascriptInterface Dex2jarDex2jar 2011/12/20 YLJ@adlab 17
18
Conclusion In our on-going work, we are developing solutions to secure WebView The goal is to defend against the attacks on WebView by building desirable security features in WebView. 2011/12/20 YLJ@adlab 18
19
2011/12/20 YLJ@adlab 19
20
2011/12/20 YLJ@adlab 20
21
2011/12/20 YLJ@adlab 21
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.