Mascara: A Novel Attack Leveraging Android Virtualization

10/20/2020
by   Marco Alecci, et al.
0

Android virtualization enables an app to create a virtual environment, in which other apps can run. Originally designed to overcome the limitations of mobile apps dimensions, malicious developers soon started exploiting this technique to design novel attacks. As a consequence, researchers proposed new defence mechanisms that enable apps to detect whether they are running in a virtual environment. In this paper, we propose Mascara, the first attack that exploits the virtualization technique in a new way, achieving the full feasibility against any Android app and proving the ineffectiveness of existing countermeasures. Mascara is executed by a malicious app, that looks like the add-on of the victim app. As for any other add-on, our malicious one can be installed as a standard Android app, but, after the installation, it launches Mascara against the victim app. The malicious add-on is generated by Mascarer, the framework we designed and developed to automate the whole process. Concerning Mascara, we evaluated its effectiveness against three popular apps (i.e., Telegram, Amazon Music and Alamo) and its capability to bypass existing mechanisms for virtual environments detection. We analyzed the efficiency of our attack by measuring the overhead introduced at runtime by the virtualization technique and the compilation time required by Mascarer to generate 100 malicious add-ons (i.e., less than 10 sec). Finally, we designed a robust approach that detects virtual environments by inspecting the fields values of ArtMethod data structures in the Android Runtime (ART) environment.

READ FULL TEXT
research
08/08/2017

Ghera: A Repository of Android App Vulnerability Benchmarks

Security of mobile apps affects the security of their users. This has fu...
research
06/24/2018

Are Free Android App Security Analysis Tools Effective in Detecting Known Vulnerabilities?

Increasing interest to secure Android ecosystem has spawned numerous eff...
research
09/10/2020

You Shall not Repackage! A Journey into the World of Anti-Repackaging on Android

App repackaging refers to the practice of customizing an existing mobile...
research
05/12/2021

Responding to Living-Off-the-Land Tactics using Just-in-Time Memory Forensics (JIT-MF) for Android

Digital investigations of stealthy attacks on Android devices pose parti...
research
12/16/2020

ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection

App repackaging refers to the practice of customizing an existing mobile...
research
03/05/2021

App's Auto-Login Function Security Testing via Android OS-Level Virtualization

Limited by the small keyboard, most mobile apps support the automatic lo...
research
01/13/2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications

Cross-app collaboration via inter-component communication is a fundament...

Please sign up or login with your details

Forgot password? Click here to reset