SUPOR- Precise and Scalable Sensitive User Input .ppt
《SUPOR- Precise and Scalable Sensitive User Input .ppt》由会员分享,可在线阅读,更多相关《SUPOR- Precise and Scalable Sensitive User Input .ppt(38页珍藏版)》请在麦多课文档分享上搜索。
1、SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps,Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang,Sensitive Data Disclosures,Local Storage,USENIX Security 2015,1,Disclosed to public,Hijacked/maliciously retrieved,8/14/15,Sensitive
2、 Data,Existing work focused on sensitive data defined by certain API methods. Most of them are permission protected E.g., in Android, TelephonyManager.getDeviceId(),USENIX Security 2015,2,TaintDroidOSDI10, AndroidLeaksTRUST12, FlowDroidPLDI14,PiOSNDSS11,8/14/15,Sensitive User Inputs,USENIX Security
3、2015,3,We are among the first to detect user inputs as sensitive sources in mobile apps. None of them are permission protected E.g., user id/password, credit card number,Insensitive,Sensitive,8/14/15,Example User Inputs Disclosures,EditText txtCN = findViewById(R.id.cardnum); String cnum = txtCN.get
4、Text().toString(); ,EditText txtCM = findViewById(Rment); String comment = txtCM.getText().toString(); ,Web Server,HTTP,HTTP,USENIX Security 2015,4,8/14/15,Research Problems,How to systematically discover the input fields from an apps UI?How to identify which input fields are sensitive?How to associ
5、ate the sensitive input fields to the corresponding variables in the apps that store their values?,USENIX Security 2015,5,8/14/15,Intuition,From the users perspective, if we can mimic how a user looks at the UIs, we can determine which input fields can contain sensitive data within the UI context.,U
6、SENIX Security 2015,6,8/14/15,Feasibility,Render the statically defined UI layouts,USENIX Security 2015,7,Associate labels to input fields based on physical locations,8/14/15,USENIX Security 2015,8,SUPOR: Sensitive User inPut detectOR,8/14/15,Background - UI,USENIX Security 2015,9,Text Label,Input F
7、ield,Input Hint,Widget,8/14/15,Background Layout File,A piece in an Android layout example.,USENIX Security 2015,10,Identifier,Interesting Attribute,8/14/15,Overview of SUPOR,USENIX Security 2015,11,Layout Analysis,Layout Parsing,UI Rendering,UI Sensitiveness Analysis,Privacy Analysis,Disclosure,Key
8、words,Variable Binding,SUPOR,Vulnerability,App,8/14/15,Parsing Layout,USENIX Security 2015,12,We need to know which layout files contain input fields.,Is Sensitive User Input Detection Needed?,Layout file,layout contains input fields,layout doesnt contain input fields,8/14/15,Rendering UI,USENIX Sec
9、urity 2015,13,Layout file A,Layout file B,Statically render layout files to UIs as users look at on smartphones via tools like ADT in Android.,8/14/15,Extracting Information,USENIX Security 2015,14,Collect information,Text Label Text: Card Number Coordinates: 16, 231, 109, 249 Input Field Hint: 15 o
10、r 16 digit Coordinates: 16, 249, 464, 297,8/14/15,UI Sensitiveness Analysis,USENIX Security 2015,15,Sensitive Attributes in Layout Files,The Input Field is Sensitive,Yes,Sensitive Input Hint,Yes,Sensitive Text Label,The Input Field is Insensitive,No,No,15 or 16 digit MM - YYYY,No,Yes,Card number Exp
11、iration date,Challenge: How to precisely associate the correlated text label to a given input field?,Enter Password,Comment,8/14/15,Associating Labels (1),Intuition: labels at different positions relative to the input field have different probabilities to be correlated.,USENIX Security 2015,16,Input
12、 Field,Label,Input Field,Label,Input Field,Label,Input Field,Label,8/14/15,Associating Labels (2),Assign position-based weights based on empirical observations The smaller the weight, the closer the correlation,USENIX Security 2015,17,Input Field,0.8,2,4,8,8,9,9,10,8/14/15,Associating Labels (3),Geo
13、metry-based correlation score computation,USENIX Security 2015,18,Label,Input Field (I),(x1, y1),(x2, y2),For each pixel (x,y) in a text label distance(I, x, y) * posWeight(I, x, y),Average the correlation score for the text label,8/14/15,Associating Labels (4),Find out the label with the smallest c
14、orrelation score among all potential labels for a given input field,USENIX Security 2015,19,Correlation scores,8/14/15,Determining Sensitiveness (1),USENIX Security 2015,20,Sensitive Keywords Dataset,Card number,Expiration date,Comment,Matches?,Sensitive,Insensitive,Keyword matching approach,8/14/15
15、,Yes,No,Determining Sensitiveness (2),Why is keyword matching approach effective?,USENIX Security 2015,21,We only analyze the most relevant text label,Small screen and short phrases or sentences,8/14/15,Binding Variables (1),USENIX Security 2015,22,Widget txtCN = findViewById(X); Data cnum = txtCN.g
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- SUPORPRECISEANDSCALABLESENSITIVEUSERINPUTPPT

链接地址:http://www.mydoc123.com/p-389485.html