NUST Institutional Repository

Android application collusion attacks analysis

Show simple item record

dc.contributor.author Arslan Maqsood, Hafiz Muhammad
dc.contributor.author Supervised by Dr Muhammad Faisal Amjad.
dc.date.accessioned 2020-10-27T08:04:05Z
dc.date.available 2020-10-27T08:04:05Z
dc.date.issued 2018-12
dc.identifier.other TIS-263
dc.identifier.other MSIS-15
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/5861
dc.description.abstract Android applications can bypass current security model of Android OS, when working together which is said to be application collusion. Android has no special check for inter application communication. These capabilities can easily go unnoticed because only individual application's permissions are shown. To overcome this weakness we developed a mechanism which can detect intent based inter-application data flow and found if there is any collusion between applications. Our main focus is to detect data flow between applications and also extracts data which is being sent between applications. We develop a tool, IADF Analyzer, which tells us which applications are sending data to each other. After getting this information, we manually check if receiving application has permissions to receive that data. As a proof of concept, we analyse a potentially vulnerable application i.e. Sieve developed by MWRSecurity [15]. While analyzing real world application from Google Play store we found one activity of GroupMe application is prone to privacy leakage. IADF Analyzer can be used by developers and security analysts while developing or analysing applications, respectively. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Android application collusion attacks analysis en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account