Device Administrator Use and Abuse in Android

Device Administrator Use and Abuse in Android

Device Administrator Use and Abuse in Android: Detection and Characterization Zhiyong Shan Raina Samuel Iulian Neamtiu Wichita State University New Jersey Institute of New Jersey Institute of Wichita, Kansas, USA Technology Technology zhiyong:shan@wichita:edu Newark, New Jersey, USA Newark, New Jersey, USA res9@njit:edu ineamtiu@njit:edu ABSTRACT KEYWORDS Device Administrator (DA) capabilities for mobile devices, mobile applications; security; static analysis; mobile device e.g., remote locking/wiping, or enforcing password strength, management were originally introduced to help organizations manage ACM Reference Format: phone fleets or enable parental control. However, DA ca- Zhiyong Shan, Raina Samuel, and Iulian Neamtiu. 2019. Device pabilities have been subverted and abused: malicious apps Administrator Use and Abuse in Android: Detection and Charac- have used DA to create ransomware or lock users out, while terization. In The 25th Annual International Conference on Mobile benign apps have used DA to prevent or hinder uninstal- Computing and Networking (MobiCom ’19), October 21–25, 2019, lation; in certain cases the only remedy is to factory-reset Los Cabos, Mexico. ACM, New York, NY, USA, 16 pages. https: the phone. We call these apps “Deathless Device Administra- //doi:org/10:1145/3300061:3345452 tor” (DDA), i.e., apps that cannot be uninstalled. We provide the first systematic study of Android DA capabilities, DDA 1 INTRODUCTION apps, DDA-attack resistance across Android versions, and To facilitate managing mobile device fleets, mobile OSes have DDA-induced families in malicious apps. To enable scalable introduced the concepts of Device Administration (“DA” on studies of questionable DA behavior, we developed DAAX, a Android [11]) or Mobile Device Management (“MDM” on static analyzer which exposes potential DA abuse effectively iOS [13]). DA/MDM give fleet device issuers control over and efficiently. In a corpus of 39,459 apps (20,467 malicious a wide range of security capabilities according to company and 18,992 benign) DAAX has found 4,135 DA apps and 691 policy, e.g., enforce password strength/expiration, or lock- potential DDA apps. The static analysis results on the 4,135 /wipe devices remotely. Other examples include the ability apps were cross-checked via dynamic analysis on at least 3 to restrict app behavior, e.g., an app used at a public kiosk; phones, confirming 578 true DDAs, including apps currently or for parental control (Section 2 provides an overview of on Google Play. The study has shown that DAAX is effective DA while Section 3 characterizes DA use in benign apps). (84.8% F-measure) and efficient (analysis typically takes 205 These capabilities can be, and have been, abused. To the seconds per app). best of our knowledge, there are no tools or studies for un- derstanding the DA ecosystem: detecting DA use and abuse, CCS CONCEPTS characterizing benign and malicious DA behavior, under- • Security and privacy → Mobile platform security; Soft- standing consequences of malicious behavior and recovery ware security engineering; • Software and its engineer- strategies, grouping malicious behavior into families, etc. ing → Automated static analysis. We fill this gap with (1) an automated, effective and efficient approach to detect, and (2) a study to characterize, DA-based abuse. While we target the Android platform, the potential Permission to make digital or hard copies of all or part of this work for for abuse is present in other platforms that offer DA/MDM. personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear One such widely-abused capability is leveraging active DA this notice and the full citation on the first page. Copyrights for components permissions to prevent app uninstallation. Specifically, apps of this work owned by others than ACM must be honored. Abstracting with employ techniques to (1) conceal their DA status so the user credit is permitted. To copy otherwise, or republish, to post on servers or to is unaware of these apps’ privileges, or (2) prevent the DA redistribute to lists, requires prior specific permission and/or a fee. Request status from being deactivated – a practice that compromises permissions from [email protected]. device security and can render the device unusable until a MobiCom ’19, October 21–25, 2019, Los Cabos, Mexico © 2019 Association for Computing Machinery. factory reset. We name such apps Deathless Device Adminis- ACM ISBN 978-1-4503-6169-9/19/10...$15.00 trator (DDA) apps. We have studied a wide range of malware https://doi:org/10:1145/3300061:3345452 and benign apps that have DA permissions, and defined three DDA categories: DDA-Reset, DDA-Hide, and DDA-Expert We envision DAAX being useful in a variety of settings. (Section 4). We have discovered all three classes of DDA App markets can use DAAX to determine whether an app behavior in numerous apps that are still on Google Play. might contain DDA-Reset, DDA-Hide, or DDA-Expert code. Responsible Disclosure. We reported this attack vector to Developers can use DAAX to find inadvertent violations of Google on 02/11/19. On 02/12/19, Google’s Android Secu- DA protocol. End users can find potentially harmful DA rity team opened an Android External Security Report, and behavior before installing an app. requested the standard 90-day disclosure window before making the findings public. On 02/22/19, Google rated the 2 DEVICE ADMINISTRATOR OVERVIEW issue as “moderate severity. Moderate severity issues are often DA – a set of “extra” app privileges allowing tighter con- fixed at the next appropriate opportunity.” due to the mul- trol, or even remote control, over Android devices – was tiple security implications, e.g., “Local permanent denial of originally introduced in Android 2.2 to facilitate enterprise service (device requires a factory reset)”, or “Local bypass of applications and management of device fleets. Starting with 1 user interaction requirements”, etc. We have been in contact Android 5, an alternative, superior set of features, “Android with Google’s Android Security Team and supplied the apps, for Work”, was introduced, but apps have continued to use, environment information, etc. for reproducing the issues. and unfortunately, abuse, DA. We first discuss the DA time- To permit automated, scalable DDA detection, we have line and then the lifecycle of a DA app on a device. developed DAAX (DA Abuse eXposer), a static analyzer that exposes potential DA abusive behavior (Section 5). We pro- 2.1 DA Timeline vide an evaluation of DAAX in Section 6. We started with a Android 2.2 (May 2010): DA policies introduced. DA corpus of 39,459 sample apps (20,467 malicious and 18,992 support was introduced, supporting the following policies: benign). The 4,135 apps in the corpus that used DA were then analyzed dynamically (on the phone) and statically via DAAX. (1) Enforcing password strength, reuse and expiration re- DAAX has detected 244 DDA-Reset apps, 7 DDA-Hide apps quirements, and forcing a password change. and 327 DDA-Expert apps. We manually verified DDAs on (2) Enforcing inactivity locks. at least 3 phones running 3 different Android versions. We (3) Forcing a certain storage area to be encrypted. confirmed DDA behavior in 578 apps, including apps cur- (4) Disabling the camera. rently on Google Play. DAAX’s precision was 83.7%; its recall (5) Remote device locking. was 86% (hence a 84.8% F-measure). The median per-app (6) Remote device wiping. analysis time was 205 seconds. Android 5.0 (Nov. 2014) – Android 8.0 (Aug. 2017): Section 7 contains a longitudinal study on the effectiveness Android for Work introduced, expanded. Android for of DDA attack vectors across five Android OS versions: 5.1, Work (later, Android Enterprise, “AE” [8]) introduced the 6.0.1, 7.1, 8.0, and 9.0. We found that more recent OS versions concepts of managed devices, employed-owned devices, or have added techniques that give users more control over apps, work profiles – a set of features/policies somewhat similar thus empowering users to combat DDA more effectively. to DA but broader, more secure, and with clearer roles. For malicious apps, we combined DAAX results with char- Dec. 2017: Planned DA deprecation is announced. acteristics such as DDA icon, DDA name and DDA behavior Google recommends that apps transition away from DA to to define 15 DDA families, described in Section 8. In Section 9 AE and announces that DA will gradually be deprecated [35]. we outline solutions for eliminating or reducing the risk of Android 9 (Aug. 2018): enterprise&soft deprecation. DDA, and expose pre-installed hidden DA apps. Starting with Android 9, DA was deprecated for enterprise To summarize, we make the following contributions: use. For non-enterprise use, several policies (password expi- (1) An exposé of DA use/abuse, including 110 confirmed ration, disabling camera) were soft-deprecated, i.e., marked abuses in benign apps and 468 in malicious apps. as deprecated but apps continue to function [10]. (2) DAAX, an automated approach and tool to detect (po- Android 10: hard deprecation. The aforementioned poli- tentially abusive) DA behavior. cies that were soft-deprecated will be hard-deprecated start- (3) A study that used DAAX on 20,467 malicious apps and ing with Android 10, i.e., apps targeting 2019+ API levels 18,992 benign apps. that attempt to use the policy will trigger a SecurityException. (4) A longitudinal study that compares the effectiveness Nevertheless, at least three policies – forcing a device lock, of DDA attack vectors across five Android versions. wipe, password reset – will continue to be supported [10]. (5) A characterization of malware DA behavior (families). DA features can benefit organizations, IT admins, or par- ents.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    16 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us