skip to main content
10.1145/3243734.3243785acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android

Published:15 October 2018Publication History

ABSTRACT

In the context of mobile-based user-interface (UI) attacks, the common belief is that clickjacking is a solved problem. On the contrary, this paper shows that clickjacking is still an open problem for mobile devices. In fact, all known academic and industry solutions are either not effective or not applicable in the real-world for backward compatibility reasons. This work shows that, as a consequence, even popular and sensitive apps like Google Play Store remain, to date, completely unprotected from clickjacking attacks. After gathering insights into how apps use the user interface, this work performs a systematic exploration of the design space for an effective and practical protection against clickjacking attacks. We then use this exploration to guide the design of ClickShield, a new defensive mechanism. To address backward compatibility issues, our design allows for overlays to cover the screen, and we employ image analysis techniques to determine whether the user could be confused. We have implemented a prototype and we have tested it against ClickBench, a newly developed benchmark specifically tailored to stress-test clickjacking protection solutions. This dataset is constituted by 104 test cases, and it includes real-world and simulated benign and malicious examples that evaluate the system across a wide range of legitimate and attack scenarios. The results show that our system is able to address backward compatibility concerns, to detect all known attacks (including a never-seen-before real-world malware that was published after we have developed our solution), and it introduces a negligible overhead.

Skip Supplemental Material Section

Supplemental Material

p1120-possemato.mp4

mp4

386.7 MB

References

  1. Yair Amit. 2016. 95.4 Percent of All Android Devices Are Susceptible to Accessibility Clickjacking Exploits. https://www.skycure.com/blog/95--4-android-devices-susceptible-accessibility-clickjacking-exploits/.Google ScholarGoogle Scholar
  2. Yair Amit. 2016. "Accessibility Clickjacking" -- The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. https://www.skycure.com/blog/accessibility-clickjacking/.Google ScholarGoogle Scholar
  3. Benjamin Andow, Akhil Acharya, Dengfeng Li, William Enck, Kapil Singh, and Tao Xie. 2017. UiRef: analysis of sensitive user inputs in Android applications. In WISEC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, and Giovanni Vigna. 2015. What the App is That? Deception and Countermeasures in the Android User Interface. In Proc. of the IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Nicholas Carlini and David A. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA.Google ScholarGoogle Scholar
  6. Qi Alfred Chen, Zhiyun Qian, and Z Morley Mao. 2014. Peeking Into Your App Without Actually Seeing It: UI State Inference and Novel Android Attacks. In Proc. of the USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F-Droid. 2018. Free and Open Source (FOSS) software on the Android platform. https://f-droid.org/en/Google ScholarGoogle Scholar
  8. Adrienne Porter Felt and David Wagner. 2011. Phishing on Mobile Devices. In Proc. of IEEE Workshop on Web 2.0 Security & Privacy (W2SP).Google ScholarGoogle Scholar
  9. Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J Alex Halderman, Z Morley Mao, and Atul Prakash. 2016. Android UI Deception Revisited: Attacks and Defenses. In Proc. of Financial Cryptography and Data Security (FC).Google ScholarGoogle Scholar
  10. Yanick Fratantonio, Chenxiong Qian, Pak Chung, and Wenke Lee. 2017. Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop. In Proceedings of the IEEE Symposium on Security and Privacy (S&P).Google ScholarGoogle ScholarCross RefCross Ref
  11. geeksonsecurity. 2018. Android Overlay Protector. https://geeksonsecurity.github.io/overlay-protector-website/.Google ScholarGoogle Scholar
  12. Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, and Guofei Jiang. 2015. SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. In USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Google Inc. 2018. Documentation for the FLAG_WINDOW_IS_OBSCURED flag. https://developer.android.com/reference/android/view/MotionEvent.html#FLAG_WINDOW_IS_OBSCUREDGoogle ScholarGoogle Scholar
  14. Luka Malisa, Kari Kostiainen, and Srdjan Capkun. 2015. Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. In Cryptology ePrint Archive, Report 2015/709.Google ScholarGoogle Scholar
  15. Amar Menezes. 2018. Privilege Escalation via adbd Misconfiguration. https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-android-adbd-privilege-escalation-advisory-2018-01--17.pdf .Google ScholarGoogle Scholar
  16. Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, and Xiaofeng Wang. 2015. UIPicker: User-Input Privacy Identification in Mobile Applications. In USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Marcus Niemietz and Jörg Schwenk. 2012. UI Redressing Attacks on Android devices. Black Hat Abu Dhabi (2012).Google ScholarGoogle Scholar
  18. Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, and Ananthram Swami. 2017. Practical Black-Box Attacks Against Machine Learning. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '17). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Chuangang Ren, Peng Liu, and Sencun Zhu. 2017. WindowGuard: Systematic Protection of GUI Security in Android. In Proc. of the Annual Symposium on Network and Distributed System Security (NDSS).Google ScholarGoogle ScholarCross RefCross Ref
  20. Chuangang Ren, Yulong Zhang, Hui Xue, Tao Wei, and Peng Liu. 2015. Towards Discovering and Understanding Task Hijacking in Android. In Proc. of USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Talia Ringer, Dan Grossman, and Franziska Roesner. 2016. AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems. In Proc. of the Conference on Computer and Communications Security (CCS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J Wang, and Crispin Cowan. 2012. User-driven Access Control: Rethinking Per- mission Granting in Modern Operating Systems. In Proc. of the IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh. 2010. Framing Attacks on Smart Phones and Dumb Routers: Tap-jacking and Geo-localization Attacks. In Proc. of the USENIX Conference on Offensive Technologies. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Tara Seals. 2016. Autorooting, Overlay Malware Are Rising Android Threats. http://www.infosecurity-magazine.com/news/autorooting-overlay-malware-are/.Google ScholarGoogle Scholar
  25. SFYLABS. {n. d.}. Client Side Detection (CSD). https://clientsidedetection.com.Google ScholarGoogle Scholar
  26. Tom Spring. 2016. SCOURGE OF ANDROID OVERLAY MALWARE ON RISE. https://threatpost.com/scourge-of-android-overlay-malware-on-rise/117720/.Google ScholarGoogle Scholar
  27. Cameron Summerson. 2017. How to Fix the "Screen Overlay Detected" Error on Android. https://www.howtogeek.com/271519/how-to-fix-the-screen-overlay-detected-error-on-android/Google ScholarGoogle Scholar
  28. Urbandroid Team. 2018. Twilight App. https://play.google.com/store/apps/details?id=com.urbandroid.lux&hl=en.Google ScholarGoogle Scholar
  29. Longfei Wu, Benjamin Brandt, Xiaojiang Du, and Bo Ji. 2016. Analysis of click-jacking attacks and an effective defense scheme for Android devices. 2016 IEEE Conference on Communications and Network Security (CNS) (2016), 55--63.Google ScholarGoogle ScholarCross RefCross Ref
  30. Martin Zhang. 2016. Android ransomware variant uses clickjacking to become device administrator. http://www.symantec.com/connect/blogs/android-ransomware-variant-uses-clickjacking-become-device-administrator.Google ScholarGoogle Scholar
  31. Wu Zhou, Linhai Song, Jens Monrad, Junyuan Zeng, and Jimmy Su. 2016. The Latest Android Overlay Malware Spreading via SMS Phishing in Europe. https://www.fireeye.com/blog/threat-research/2016/06/latest-android-overlay-malware-spreading-in-europe.html.Google ScholarGoogle Scholar

Index Terms

  1. ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
      October 2018
      2359 pages
      ISBN:9781450356930
      DOI:10.1145/3243734

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 October 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CCS '18 Paper Acceptance Rate134of809submissions,17%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader