Skip to main navigation Skip to search Skip to main content

Identifying mobile inter-app communication risks

  • Karim O. Elish
  • , Haipeng Cai
  • , Daniel Barton
  • , Danfeng Yao
  • , Barbara G. Ryder
  • Florida Polytechnic University
  • Virginia Polytechnic Institute and State University

Research output: Contribution to journalArticlepeer-review

36 Scopus citations

Abstract

Malware collusion is a technique utilized by attackers to evade standard detection. It is a new threat where two or more applications, appearing benign, communicate to perform a malicious task. Most proposed approaches aim at detecting stand-alone malicious applications. We point out the need for analyzing data flows across multiple Android apps, a problem referred to as end-to-end flow analysis. In this work, we present a flow analysis for app pairs that computes the risk level associated with their potential communications. Our approach statically analyzes the sensitivity and context of each inter-app flow based on inter-component communication (ICC) between communicating apps, and defines fine-grained security policies for inter-app ICC risk classification. We perform an empirical study on 7,251 apps from the Google Play store to identify the apps that communicate with each other via ICC channels. Our results report four times fewer warnings on our dataset of 197 real app pairs communicating via explicit external ICCs than the state-of-the-art permission-based collusion detection.

Original languageEnglish
Article number8587187
Pages (from-to)90-102
Number of pages13
JournalIEEE Transactions on Mobile Computing
Volume19
Issue number1
DOIs
StatePublished - Jan 1 2020

Keywords

  • Android ICC
  • inter-app analysis
  • malware collusion
  • risk assessment
  • static analysis

Fingerprint

Dive into the research topics of 'Identifying mobile inter-app communication risks'. Together they form a unique fingerprint.

Cite this