Security and Privacy in Communication Networks. 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings

Research Article

LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection

Download
173 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-78813-5_15,
        author={Yi He and Qi Li and Kun Sun},
        title={LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection},
        proceedings={Security and Privacy in Communication Networks. 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22--25, 2017, Proceedings},
        proceedings_a={SECURECOMM},
        year={2018},
        month={4},
        keywords={Android Privacy leakage Large-scale detection},
        doi={10.1007/978-3-319-78813-5_15}
    }
    
  • Yi He
    Qi Li
    Kun Sun
    Year: 2018
    LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-78813-5_15
Yi He1,*, Qi Li1,*, Kun Sun2,*
  • 1: Tsinghua University
  • 2: George Mason University
*Contact email: heyi14@mails.tsinghua.edu.cn, qi.li@sz.tsinghua.edu.cn, ksun3@gmu.edu

Abstract

Android enables inter-app collaboration and function reusability by providing flexible Inter-Component Communication (ICC) across apps. Meanwhile, ICC introduces serious privacy leakage problems due to component hijacking, component injection, and application collusion attacks. Taint analysis technique has been adopted to successfully detect potential leakage between two mobile apps. However, it is still a challenge to efficiently perform large-scale leakage detection among a large set of apps, which may communicate through various ICC channels. In this paper, we develop a privacy leakage detection mechanism called LinkFlow to detect privacy leakage through ICC on a large set of apps. LinkFlow first leverages taint analysis technique to enumerate ICC links that may lead to privacy leakage in each individual app. Since most ICC links are normal, this step can dramatically reduce the number of risky ICC links for the next step analysis, where those ICC links are matched among leaky apps. We develop an algorithm to identify privacy leakage by analyzing ICC links and the associated permissions. We implement a LinkFlow prototype and evaluate its effectiveness with more than 4500 apps including 3014 benign apps from five apps marketplaces and 1500 malicious apps from two malware repositories. LinkFlow can successfully capture 6065 privacy leak paths among 530 apps. We also observe that more than 400 benign apps have vulnerabilities of privacy leakage in inter-app communications.