Aware: Controlling App Access to I/O Devices on Mobile Platforms

04/07/2016
by   Giuseppe Petracca, et al.
0

Smartphones' cameras, microphones, and device displays enable users to capture and view memorable moments of their lives. However, adversaries can trick users into authorizing malicious apps that exploit weaknesses in current mobile platforms to misuse such on-board I/O devices to stealthily capture photos, videos, and screen content without the users' consent. Contemporary mobile operating systems fail to prevent such misuse of I/O devices by authorized apps due to lack of binding between users' interactions and accesses to I/O devices performed by these apps. In this paper, we propose Aware, a security framework for authorizing app requests to perform operations using I/O devices, which binds app requests with user intentions to make all uses of certain I/O devices explicit. We evaluate our defense mechanisms through laboratory-based experimentation and a user study, involving 74 human subjects, whose ability to identify undesired operations targeting I/O devices increased significantly. Without Aware, only 18 identify attacks from tested RAT apps. Aware systematically blocks all the attacks in absence of user consent and supports users in identifying 82 social-engineering attacks tested to hijack approved requests, including some more sophisticated forms of social engineering not yet present in available RATs. Aware introduces only 4.79 targeting I/O devices. Aware shows that a combination of system defenses and user interface can significantly strengthen defenses for controlling the use of on-board I/O devices.

READ FULL TEXT

page 5

page 8

page 9

page 16

page 17

research
02/23/2021

I Want My App That Way: Reclaiming Sovereignty Over Personal Devices

Dark patterns in mobile apps take advantage of cognitive biases of end-u...
research
04/01/2016

AuDroid: Preventing Attacks on Audio Channels in Mobile Devices

Voice control is a popular way to operate mobile devices, enabling users...
research
10/09/2019

Aegis: A Context-aware Security Framework for Smart Home Systems

Our everyday lives are expanding fast with the introduction of new Smart...
research
01/14/2018

Tyche: Risk-Based Permissions for Smart Home Platforms

Emerging smart home platforms, which interface with a variety of physica...
research
03/09/2018

VR Content Capture using Aligned Smartphones

There are a number of dedicated 3D capture devices in the market, but ge...
research
08/14/2023

BehaVR: User Identification Based on VR Sensor Data

Virtual reality (VR) platforms enable a wide range of applications, howe...
research
08/25/2022

Snooping on Snoopers: Logging as a Security Response to Physical Attacks on Mobile Devices

When users leave their mobile devices unattended, or let others use them...

Please sign up or login with your details

Forgot password? Click here to reset