Analyzing use of high privileges on android

an empirical case study of screenshot and screen recording applications

Mark H. Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Abstract

The number of Android smartphone and tablet users has experienced a rapid growth in the past few years and it raises users’ awareness on privacy and security issues of their mobile devices. There are lots of users rooting their Android devices for some useful functions, which are not originally provided to developers and users, such as taking screenshot and screen recording. However, after observing the danger of rooting devices, the developers begin to look for non-root alternatives to implement those functions. Android Debug Bridge (ADB) workaround is one of the best known non-root alternatives to help app gain a higher privilege on Android. It used to be considered as a secure practice until some cases of ADB privilege leakage have been found. In this paper, we propose an approach to identify the potential privilege leakage in Android apps that using ADB workaround. We apply our approach to analyze three real-world apps that are downloaded from Google Play Store. We then present a general methodology to conduct exploitation on those apps using ADB workaround. Based on our study, we suggest some mitigation techniques to help developers create their apps that not only satisfy users’ needs but also protect users’ privacy from similar attacks in future.

Original languageEnglish
Title of host publicationInformation Security and Cryptology
Subtitle of host publication14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers
EditorsFuchun Guo, Xinyi Huang, Moti Yung
Place of PublicationCham Switzerland
PublisherSpringer
Pages349-369
Number of pages21
ISBN (Electronic)9783030142346
ISBN (Print)9783030142339
DOIs
Publication statusPublished - 2019
EventInternational Conference on Information Security and Cryptology 2018 - Fuzhou, China
Duration: 14 Dec 201817 Dec 2018
Conference number: 14th
http://xxhb.fjnu.edu.cn/inscrypt2018/

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume11449
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Information Security and Cryptology 2018
Abbreviated titleInscrypt 2018
CountryChina
CityFuzhou
Period14/12/1817/12/18
Internet address

Keywords

  • ADB workaround
  • Android security
  • Application analysis
  • Exploit
  • Privilege escalation

Cite this

Meng, M. H., Bai, G., Liu, J. K., Luo, X., & Wang, Y. (2019). Analyzing use of high privileges on android: an empirical case study of screenshot and screen recording applications. In F. Guo, X. Huang, & M. Yung (Eds.), Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers (pp. 349-369). (Lecture Notes in Computer Science ; Vol. 11449 ). Cham Switzerland: Springer. https://doi.org/10.1007/978-3-030-14234-6_19
Meng, Mark H. ; Bai, Guangdong ; Liu, Joseph K. ; Luo, Xiapu ; Wang, Yu. / Analyzing use of high privileges on android : an empirical case study of screenshot and screen recording applications. Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. editor / Fuchun Guo ; Xinyi Huang ; Moti Yung. Cham Switzerland : Springer, 2019. pp. 349-369 (Lecture Notes in Computer Science ).
@inproceedings{f3964a423e2b47bf92547adadf148c82,
title = "Analyzing use of high privileges on android: an empirical case study of screenshot and screen recording applications",
abstract = "The number of Android smartphone and tablet users has experienced a rapid growth in the past few years and it raises users’ awareness on privacy and security issues of their mobile devices. There are lots of users rooting their Android devices for some useful functions, which are not originally provided to developers and users, such as taking screenshot and screen recording. However, after observing the danger of rooting devices, the developers begin to look for non-root alternatives to implement those functions. Android Debug Bridge (ADB) workaround is one of the best known non-root alternatives to help app gain a higher privilege on Android. It used to be considered as a secure practice until some cases of ADB privilege leakage have been found. In this paper, we propose an approach to identify the potential privilege leakage in Android apps that using ADB workaround. We apply our approach to analyze three real-world apps that are downloaded from Google Play Store. We then present a general methodology to conduct exploitation on those apps using ADB workaround. Based on our study, we suggest some mitigation techniques to help developers create their apps that not only satisfy users’ needs but also protect users’ privacy from similar attacks in future.",
keywords = "ADB workaround, Android security, Application analysis, Exploit, Privilege escalation",
author = "Meng, {Mark H.} and Guangdong Bai and Liu, {Joseph K.} and Xiapu Luo and Yu Wang",
year = "2019",
doi = "10.1007/978-3-030-14234-6_19",
language = "English",
isbn = "9783030142339",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "349--369",
editor = "Fuchun Guo and Xinyi Huang and Moti Yung",
booktitle = "Information Security and Cryptology",

}

Meng, MH, Bai, G, Liu, JK, Luo, X & Wang, Y 2019, Analyzing use of high privileges on android: an empirical case study of screenshot and screen recording applications. in F Guo, X Huang & M Yung (eds), Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Lecture Notes in Computer Science , vol. 11449 , Springer, Cham Switzerland, pp. 349-369, International Conference on Information Security and Cryptology 2018, Fuzhou, China, 14/12/18. https://doi.org/10.1007/978-3-030-14234-6_19

Analyzing use of high privileges on android : an empirical case study of screenshot and screen recording applications. / Meng, Mark H.; Bai, Guangdong; Liu, Joseph K.; Luo, Xiapu; Wang, Yu.

Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. ed. / Fuchun Guo; Xinyi Huang; Moti Yung. Cham Switzerland : Springer, 2019. p. 349-369 (Lecture Notes in Computer Science ; Vol. 11449 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

TY - GEN

T1 - Analyzing use of high privileges on android

T2 - an empirical case study of screenshot and screen recording applications

AU - Meng, Mark H.

AU - Bai, Guangdong

AU - Liu, Joseph K.

AU - Luo, Xiapu

AU - Wang, Yu

PY - 2019

Y1 - 2019

N2 - The number of Android smartphone and tablet users has experienced a rapid growth in the past few years and it raises users’ awareness on privacy and security issues of their mobile devices. There are lots of users rooting their Android devices for some useful functions, which are not originally provided to developers and users, such as taking screenshot and screen recording. However, after observing the danger of rooting devices, the developers begin to look for non-root alternatives to implement those functions. Android Debug Bridge (ADB) workaround is one of the best known non-root alternatives to help app gain a higher privilege on Android. It used to be considered as a secure practice until some cases of ADB privilege leakage have been found. In this paper, we propose an approach to identify the potential privilege leakage in Android apps that using ADB workaround. We apply our approach to analyze three real-world apps that are downloaded from Google Play Store. We then present a general methodology to conduct exploitation on those apps using ADB workaround. Based on our study, we suggest some mitigation techniques to help developers create their apps that not only satisfy users’ needs but also protect users’ privacy from similar attacks in future.

AB - The number of Android smartphone and tablet users has experienced a rapid growth in the past few years and it raises users’ awareness on privacy and security issues of their mobile devices. There are lots of users rooting their Android devices for some useful functions, which are not originally provided to developers and users, such as taking screenshot and screen recording. However, after observing the danger of rooting devices, the developers begin to look for non-root alternatives to implement those functions. Android Debug Bridge (ADB) workaround is one of the best known non-root alternatives to help app gain a higher privilege on Android. It used to be considered as a secure practice until some cases of ADB privilege leakage have been found. In this paper, we propose an approach to identify the potential privilege leakage in Android apps that using ADB workaround. We apply our approach to analyze three real-world apps that are downloaded from Google Play Store. We then present a general methodology to conduct exploitation on those apps using ADB workaround. Based on our study, we suggest some mitigation techniques to help developers create their apps that not only satisfy users’ needs but also protect users’ privacy from similar attacks in future.

KW - ADB workaround

KW - Android security

KW - Application analysis

KW - Exploit

KW - Privilege escalation

UR - http://www.scopus.com/inward/record.url?scp=85064111096&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-14234-6_19

DO - 10.1007/978-3-030-14234-6_19

M3 - Conference Paper

SN - 9783030142339

T3 - Lecture Notes in Computer Science

SP - 349

EP - 369

BT - Information Security and Cryptology

A2 - Guo, Fuchun

A2 - Huang, Xinyi

A2 - Yung, Moti

PB - Springer

CY - Cham Switzerland

ER -

Meng MH, Bai G, Liu JK, Luo X, Wang Y. Analyzing use of high privileges on android: an empirical case study of screenshot and screen recording applications. In Guo F, Huang X, Yung M, editors, Information Security and Cryptology: 14th International Conference, Inscrypt 2018 Fuzhou, China, December 14–17, 2018 Revised Selected Papers. Cham Switzerland: Springer. 2019. p. 349-369. (Lecture Notes in Computer Science ). https://doi.org/10.1007/978-3-030-14234-6_19