Android Vulnerability To Impersonate Trusted Applications
Android Vulnerability To Impersonate Trusted Applications
Tech-CS/SET/CST/2013-14/15
CBS.509
I.
INTRODUCTION
Android is described as a mobile operating system,
initially developed by Android Inc. Android was sold
to Google in 2005. Android is based on a modified
Linux 2.6 kernel. Google, as well as other members
of the Open Handset Alliance (OHA) collaborated on
Android (design, development, distribution).
Currently, the Android Open Source Project (AOSP)
is governing the Android maintenance and
development cycle. Android operating system is
primarily designed for smartphones and tablets.
Because Android is an open source it has become the
fastest growing mobile operating system. Due to its
open nature it has become favourite for many
consumers and developers. Moreover software
developers can easily modify and add enhanced
feature in it to meet the latest requirements of the
mobile technology. Android users download more
than 1.5 billion applications and games from Google
Play each month [6]. Due to Its Powerful
development framework users as well software
developers are able to create their own applications
for wide range of devices. Some of the key features
of Android operating system are: Application
Framework, Dalvik virtual machine, integrated
browser, Optimized Graphics, SQLite, Media
Support, GSM Technology, Bluetooth, Edge, 3G, WiFi, Camera and GPS etc. It provide JAVA
programming language for application development.
A. DIFFERENT SECURITY FEATURES OF
ANDROID OPERATING SYSTEM
Security is always the main concern of user while
moving to any platform. Android Operating system
should ensure the security of users, user's data,
applications, the device, and the network. To achieve the
security of these components Android provides these key
security features:
Security at the Operating System level through the
Linux kernel: Android operating system is based on
Linux kernel. Due to its open source nature it is
researched, attacked and fixed by many research
developers. So Linux has become stable and secure
kernel. Linux kernel provides Android with several key
security features including:
CUPB/M.Tech-CS/SET/CST/2013-14/15
CBS.509
A. FAKE ID VULNERABILITY
Every Android application has its own unique
identity, typically inherited from the corporate
developers identity. Recently a new vulnerability in
Android is discovered, which allows these identities
to be copied and used for nefarious purposes.
Dubbed Fake ID, the vulnerability allows
malicious applications to impersonate specially
recognized trusted applications without any user
notification. This can result in a wide spectrum of
consequences. For example, the vulnerability can be
used by malware to escape the normal application
sandbox and take one or more malicious actions:
insert a Trojan horse into an application by
impersonating Adobe Systems; gain access to NFC
financial and payment data by impersonating Google
Wallet; or take full management control of the entire
device by impersonating 3LM [3].
Implications: This is a widespread vulnerability
dating back to the January 2010 release of Android
2.1 and affecting all devices that are not patched for
Google bug 13678484, disclosed to Google and
released for patching in April 2014. All devices
prior to Android 4.4 (KitKat) are vulnerable to
the Adobe System webview plugin privilege
escalation, which allows a malicious application to
inject Trojan horse code (in the form of a webview
plugin) into other apps, which leads to taking
control of the entire app, all of the appss data, and
being able to do anything the app is allowed to do.
CUPB/M.Tech-CS/SET/CST/2013-14/15
CBS.509
CUPB/M.Tech-CS/SET/CST/2013-14/15
without affecting the cryptographic signature of the
application essentially allowing a malicious author
to trick Android into believing the app is unchanged
even if it has been [5].
III.
CONCLUSION
A vulnerability is not dangerous until it remain
hidden. But attackers are working day and night to
find those vulnerabilities and exploit them for
malicious
gain.
Followings
are
general
countermeasures against Android vulnerabilities:
Its important to download the apps only from the
Google Play Store and, even while downloading
from the play store, make sure that you verify the
author of the application before downloading it. Do
not install applications from untrusted sources or
other Android stores.
Google has already rolled out patches for this. Make
sure you update your mobile with the latest patches
available.
Running anti-malware software on your device.
CBS.509
[3]
[4]
[5]
[6]
[7]
REFERENCES
[1]
[2]
vulnerability-still-a-threat-to-many-devices-nearly-twoyears-later.html
Forristal, J. (2014, July 29). android-fake-id-vulnerability.
Retrieved from www.bluebox.com:
https://bluebox.com/technical/android-fake-idvulnerability/
master-key-android-vulnerability-used-to-trojanizebanking-app. (2013, August 2). Retrieved from
blog.trendmicro.com:
http://blog.trendmicro.com/trendlabs-securityintelligence/master-key-android-vulnerability-used-totrojanize-banking-app/
Rohit. (2013, august 28). android-master-key-vulnerabilitypoc. Retrieved from www.resources.infosecinstitute.com:
http://resources.infosecinstitute.com/android-master-keyvulnerability-poc/
Singh, R. (2014). An Overview of Android Operating
System and Its Security . Int. Journal of Engineering
Research and Applications , 519-521.
threat-of-the-month-android-master-key-vulnerability.
(2013, September). Retrieved from
www.scmagazine.com:
http://www.scmagazine.com/threat-of-the-monthandroid-master-key-vulnerability/article/307403/