2017 IEEE Symposium on Security and Privacy (SP) 2017
DOI: 10.1109/sp.2017.39
|View full text |Cite
|
Sign up to set email alerts
|

Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
75
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 88 publications
(78 citation statements)
references
References 4 publications
1
75
1
Order By: Relevance
“…That is, it is very difficult to capture the user giving out the answer to the right Captcha "just by accident." In particular, liveness challenges that are based on blinking and smiling are very vulnerable to attacks like UI redressing attacks [25], or more advanced attacks like those described in [50]. Under both scenarios, the attacker can drive the legitimate authentication app to a state where it's presenting the user with its liveness detection (either by using Intent, which is harder to control for more than one UI, or using the accessibility service), while covering up the phone's display with an overlay (so the user doesn't know he/she is being attacked).…”
Section: Other Security Benefitsmentioning
confidence: 99%
“…That is, it is very difficult to capture the user giving out the answer to the right Captcha "just by accident." In particular, liveness challenges that are based on blinking and smiling are very vulnerable to attacks like UI redressing attacks [25], or more advanced attacks like those described in [50]. Under both scenarios, the attacker can drive the legitimate authentication app to a state where it's presenting the user with its liveness detection (either by using Intent, which is harder to control for more than one UI, or using the accessibility service), while covering up the phone's display with an overlay (so the user doesn't know he/she is being attacked).…”
Section: Other Security Benefitsmentioning
confidence: 99%
“…The sheer number of APIs that an operating system exposes makes the security analysis at this level alone very complex. Security issues due to API misuse, uncovered for example in [3], support this claim.…”
Section: How To Avoid Orphan Misuse Casesmentioning
confidence: 85%
“…Android dialog messages suffer the same disadvantages too. Additionally, dialog messages are required to hold the quite "dangerous" system permission that allows them to draw over other screens to accomplish the desirable result, namely the SYSTEM ALERT WINDOW permission, that can be maliciously used [13].…”
Section: Human-smartphone Interactionmentioning
confidence: 99%
“…While drawing on top of other activities and partially covering them, researchers have recently started to find novel ways to do it. The bulk of the attacks exploit a recently introduced Android permission, the System Alert Window [28,13]. According to Google Developer resources [4]: "Very few apps should use this permission; these windows are intended for system-level interaction with the user".…”
Section: Introductionmentioning
confidence: 99%