Proceedings of the 2018 on Asia Conference on Computer and Communications Security 2018
DOI: 10.1145/3196494.3196538
|View full text |Cite
|
Sign up to set email alerts
|

Source Attribution of Cryptographic API Misuse in Android Applications

Abstract: Recent research suggests that 88% of Android applications that use Java cryptographic APIs make at least one mistake, which results in an insecure implementation. It is unclear, however, if these mistakes originate from code written by application or thirdparty library developers. Understanding the responsible party for a misuse case is important for vulnerability disclosure. In this paper, we bridge this knowledge gap and introduce source attribution to the analysis of cryptographic API misuse. We developed B… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
32
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(33 citation statements)
references
References 16 publications
1
32
0
Order By: Relevance
“…And partial means that for the types of vulnerabilities in Table 7, FlowDroid and the method in Ref. [12] do not detect all cases, and there may be other vulnerability situations. FlowDroid can directly detect partial sensitive data leaks.…”
Section: Detect Other Types Of Security Vulnerabilities By Dynamic Anmentioning
confidence: 99%
See 1 more Smart Citation
“…And partial means that for the types of vulnerabilities in Table 7, FlowDroid and the method in Ref. [12] do not detect all cases, and there may be other vulnerability situations. FlowDroid can directly detect partial sensitive data leaks.…”
Section: Detect Other Types Of Security Vulnerabilities By Dynamic Anmentioning
confidence: 99%
“…The analyzed vulnerability categories in Ref. [12] partially overlap with the "insecure password" vulnerability. The vulnerability categories detected by our system are relatively more comprehensive.…”
Section: Detect Other Types Of Security Vulnerabilities By Dynamic Anmentioning
confidence: 99%
“…Formula (1) indicates that if s1 and s2 belong to different Activities, they correspond to different interface states and the similarity of them is zero. When s1 and s2 belong to the same Activity, the similarity of the corresponding interface state can be calculated based on the widget path set.…”
Section: Interface State Similarity Calculationmentioning
confidence: 99%
“…To protect users' privacy in network communications, the applications can use encryption-based functions and SSL protocols. However, recent research has pointed out that about 88% of Android applications misuse the Java crypto APIs and cause security vulnerabilities [1]. Although the Android SDK implements the SSL protocol (in this paper, SSL means secure sockets layer protocol SSL and transport layer security protocol TLS) to protect communication security, the situation has not been greatly alleviated.…”
Section: Introductionmentioning
confidence: 97%
“…Next, these two classes are used in the "encryptCipher" method to initialize the Java Cipher class, in order to encrypt the PIN of the user using AES in CBC mode (see Figure 3 and 4) and store it in the device. Evidently, since the key and the initialization vector are static, it leads us to the conclusion that the produced ciphertext is deterministic [17] and can be easily decrypted to obtain the user's PIN. As a side note, the latest version released in September 2018, the vulnerabilities described have been fixed.…”
Section: E-banking Applicationmentioning
confidence: 99%