Hidden in Plain Sight: Exploring Encrypted Channels in Android apps

09/29/2022
by   Sajjad Pourali, et al.
0

As privacy features in Android operating system improve, privacy-invasive apps may gradually shift their focus to non-standard and covert channels for leaking private user/device information. Such leaks also remain largely undetected by state-of-the-art privacy analysis tools, which are very effective in uncovering privacy exposures via regular HTTP and HTTPS channels. In this study, we design and implement, ThirdEye, to significantly extend the visibility of current privacy analysis tools, in terms of the exposures that happen across various non-standard and covert channels, i.e., via any protocol over TCP/UDP (beyond HTTP/S), and using multi-layer custom encryption over HTTP/S and non-HTTP protocols. Besides network exposures, we also consider covert channels via storage media that also leverage custom encryption layers. Using ThirdEye, we analyzed 12,598 top-apps in various categories from Androidrank, and found that 2887/12,598 (22.92 encryption/decryption for network transmission and storing content in shared device storage, and 2465/2887 (85.38 (e.g., advertising ID, list of installed apps) over the network that can fingerprint users. Besides, 299 apps transmitted insecure encrypted content over HTTP/non-HTTP protocols; 22 apps that used authentication tokens over HTTPS, happen to expose them over insecure (albeit custom encrypted) HTTP/non-HTTP channels. We found non-standard and covert channels with multiple levels of obfuscation (e.g., encrypted data over HTTPS, encryption at nested levels), and the use of vulnerable keys and cryptographic algorithms. Our findings can provide valuable insights into the evolving field of non-standard and covert channels, and help spur new countermeasures against such privacy leakage and security issues.

READ FULL TEXT
research
06/26/2021

How Private is Android's Private DNS Setting? Identifying Apps by Encrypted DNS Traffic

DNS over TLS (DoT) and DNS over HTTPS (DoH) promise to improve privacy a...
research
12/28/2021

Analysis of Longitudinal Changes in Privacy Behavior of Android Applications

Privacy concerns have long been expressed around smart devices, and the ...
research
10/08/2020

Partitioned Private User Storages in End-to-End Encrypted Online Social Networks

In secure Online Social Networks (OSN), often end-to-end encryption appr...
research
06/08/2018

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Most encrypted data formats, such as PGP, leak substantial metadata in t...
research
12/08/2020

Privacy-Preserving Spam Filtering using Functional Encryption

Traditional spam classification requires the end-user to reveal the cont...
research
11/13/2019

Exploiting Satellite Broadcast despite HTTPS

HTTPS enhances end-user privacy and is often preferred or enforced by ov...
research
07/18/2022

Wink: Deniable Secure Messaging

End-to-end encrypted (E2EE) messaging is an essential first step towards...

Please sign up or login with your details

Forgot password? Click here to reset