are these ads safe detec ng hidden a4acks through mobile
play

Are these Ads Safe: Detec/ng Hidden A4acks through Mobile App-Web - PowerPoint PPT Presentation

Are these Ads Safe: Detec/ng Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi 1 , Rui Shao 2 , Yan Chen 3 , Xiang Pan 3 , Shihong Zou 4 , and Ryan Riley 5 1 University of Wisconsin and Pennsylvania State University 2 Zhejiang


  1. Are these Ads Safe: Detec/ng Hidden A4acks through Mobile App-Web Interfaces Vaibhav Rastogi 1 , Rui Shao 2 , Yan Chen 3 , Xiang Pan 3 , Shihong Zou 4 , and Ryan Riley 5 1 University of Wisconsin and Pennsylvania State University 2 Zhejiang University 3 Northwestern University 4 Beijing University of Posts and TelecommunicaJons 5 Qatar University

  2. Consider This… 2

  3. Consider This… 3

  4. The Problem • Enormous effort toward analyzing malicious applicaJons • App may itself be benign • But may lead to malicious content through links • App-web interface • Links inside the app leading to web-content • Not well-explored • Types • AdverJsements • Other links in app 4

  5. Outline App-Web Interface CharacterisJcs SoluJon Results Conclusion 5

  6. Outline App-Web Interface CharacterisJcs SoluJon Results Conclusion 6

  7. App-Web Interface Characteris/cs • Can be highly dynamic • A link may recursively redirect to another before leading to a final web page • Links embedded in apps • Can be dynamically generated • Can lead to dynamic websites • AdverJsements • Ad libraries create links dynamically • Ad economics can lead to complex redirecJon chains 7

  8. Adver/sing Overview 8

  9. Ad Networks • Ad libraries act as the interface between apps and ad network servers • Ad networks may interface with each other • SyndicaJon – One network asks another to fill ad space • Ad exchange – Real-Jme aucJon of ad space • App or original ad network may not have control on ads served 9

  10. Outline App-Web Interface CharacterisJcs SoluJon Results Conclusion 10

  11. Solu/on Components • Triggering : Interact with app to launch web links • Detec*on : Process the results to idenJfy malicious content • Provenance : IdenJfy the origin of a detected malicious acJvity • A_ribute malicious content to domains and ad networks 11

  12. Solu/on Architecture 12

  13. Triggering • Use AppsPlayground 1 • A gray box tool for app UI exploraJon • Extracts features from displayed UI and iteraJvely generates a UI model • A novel computer graphics-based algorithm for idenJfying bu_ons • See widgets and bu_ons as a human would 1 Rastogi, Vaibhav, Yan Chen, and William Enck. "AppsPlayground: automaJc security analysis of smartphone applicaJons.” In Proceedings of the third ACM conference on Data and applica6on security and privacy , pp. 209-220. ACM, 2013. 13

  14. Detec/on • AutomaJcally download content from landing pages • Use VirusTotal for detecJng malicious files and URLs 14

  15. Provenance • How did the user come across an a_ack? • Code-level a_ribuJon • App code • Ad libraries • Iden*fied 201 ad libraries • RedirecJon chain-level a_ribuJon • Which URLs led to a_ack page or content 15

  16. Outline App-Web Interface CharacterisJcs SoluJon Results Conclusion 16

  17. Results • Deployments in US and China • 600 K apps from Google Play and Chinese stores • 1.4 M app-web links triggered • 2,423 malicious URLs • 706 malicious files 17

  18. Case Study: Fake AV Scam • MulJple apps, one ad network: Tapcontext • Ad network solely serving this scam campaign • Phishing webpages detected by Google and other URL blacklists about 20 days aier we detected first instance 18

  19. Case Study: Free iPad Scam • Asked to give personal informaJon without any return • New email address receiving spam ever since • Origins at Mobclix and Tapfortap • Ad exchanges • Neither developers nor the primary ad networks likely aware of this 19

  20. Case Study: iPad Scam from sta/c link • Another Scam, this Jme through a staJc link embedded in app • Link target opens in browser and redirects to scam • Not affiliated with Facebook 20

  21. Case Study: SMS Trojan Video Player • Ad from nobot.co.jp leads to download a movie player • Player sends SMS messages to a premium number without user consent Click on ad 21

  22. Outline App-Web Interface CharacterisJcs SoluJon Results Conclusion 22

  23. Limita/ons • Incomplete detecJon • AnJviruses and URL blacklists are not perfect • Our work DroidChameleon 2 shows this • Incomplete triggering • App UI can be very complex • May sJll be sufficient to capture adverJsements 2 Rastogi, Vaibhav, Yan Chen, and Xuxian Jiang. "Catch me if you can: EvaluaJng android anJ-malware against transformaJon a_acks." Informa6on Forensics and Security, IEEE Transac6ons on 9.1 (2014): 99-108. 23

  24. Conclusion • Benign apps can lead to malicious content • Provenance makes it possible to idenJfy responsible parJes • Can provide a safer landscape for users • Screening offending applicaJons • Holding ad networks accountable for content • Working with CNCERT to improve the situaJon 24

  25. Future Work • Speeding up collecJon of ads • Goals of analyzing an order of magnitude more ads in shorter Jme 25

  26. SoOware and Dataset • Dataset of 201 ad libraries: h_p://bit.ly/adlibset • New release of AppsPlayground: h_p://bit.ly/appsplayground 26

  27. Thank you! 27

  28. Backup 28

  29. Related Work • Web MalverJsing • Other ad security and Privacy • UI exploraJon • Malware analysis and detecJon 29

  30. Comparison with Web Malver/sing • Focus on mobile applicaJons • Triggering component for web malverJsing is trivial • Different malware propagaJon mechanisms: drive- by-downloads vs. trojans 30

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend