Dios: Dynamic Privacy Analysis of Ios Applications

Dios: Dynamic Privacy Analysis of Ios Applications

Department Informatik Technical Reports / ISSN 2191-5008 Andreas Kurtz, Andreas Weinlein, Christoph Settgast, Felix Freiling DiOS: Dynamic Privacy Analysis of iOS Applications Technical Report CS-2014-03 June 2014 Please cite as: Andreas Kurtz, Andreas Weinlein, Christoph Settgast, Felix Freiling, “DiOS: Dynamic Privacy Analysis of iOS Applications,” Friedrich-Alexander-Universität Erlangen-Nürnberg, Dept. of Computer Science, Technical Reports, CS-2014-03, June 2014. Friedrich-Alexander-Universität Erlangen-Nürnberg Department Informatik Martensstr. 3 91058 Erlangen Germany · · www.cs.fau.de DiOS: Dynamic Privacy Analysis of iOS Applications Andreas Kurtz, Andreas Weinlein, Christoph Settgast, Felix Freiling Dept. of Computer Science, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany [email protected] Abstract—We present DiOS, a practical system to Because of this relevance, the information available perform automated dynamic privacy analysis of iOS on smartphones has attracted more and more attention apps. DiOS provides a highly scalable and fully auto- from the advertising industry and cybercriminals. There mated solution to schedule apps from the official Apple have been numerous reports on privacy violations of App Store for privacy analysis to iOS devices. While different forms (even for Apple products 1 , 2 ), apps are automatically executed, user interaction is [ ] [ ] whereas most of them however were discovered by simulated using random and smart execution strategies, and sensitive API calls as well as network connections accident or after intensive manual analysis work. Since are tracked. We evaluated the system on 1,136 of the manual analysis does not scale to the vast amount most popular free apps from the iOS App Store and of apps that are developed every day, automated found out that almost 20% of all investigated apps are solutions for detecting privacy leaks are in high tracking users’ locations on every app start, one third demand. Furthermore, since the entire smartphone of all accesses to users’ address books are attributed to field is changing rather quickly, it is important to apps from the social network category and almost half continuously investigate the privacy implications of of all apps are tracking users’ app usage behavior by using smartphones so that users and society can reflect incorporating tracking and advertising libraries. on (self) regulation. I. INTRODUCTION B. Related Work A. Motivation Related work in dynamic software analysis is mainly Mobile devices have become an integral part of focused on desktop operating systems [3]–[5]. Due our daily life and business. Not only do they provide to several circumstances like, e.g., different execution connectivity to friends and colleagues at any time platforms, most known techniques are not applicable to and (almost) any place, they are also used to store mobile devices. However, there have been several stud- and manage large amounts of personal data such as ies focusing on the analysis of mobile apps, although images, videos and emails. One major reason for the most of them dealing with Android. success of smartphones are the manifold opportunities Enck et al. [6] were the first to present TaintDroid, gained from their expandability by third-party mobile a system for monitoring Android apps for privacy applications (apps). violations at runtime. Later, TaintDroid was incor- However, with the increasing amount of apps offered porated in various other analysis solutions such as in central marketplaces, the risk of apps that are AppsPlayground [7] or Mobile-Sandbox [8]. However, potentially harmful to a user’s privacy rises. Privacy TaintDroid (and all other existing solution that are concerns do not necessarily refer only to the secrecy of based upon it) are limited to the Android platform application data, such as documents and emails, but and do not support analyzing native code. As code they also refer to contextual data that a smartphone in iOS is directly executed on the hardware without continuously produces through its sensors for location any abstraction layer or virtual machine, those existing (GPS), acceleration, video (camera) and audio (micro- solutions are not applicable for iOS-based dynamic phone). Since most phones are usually switched on analysis. Moreover, compared to the vast amount and carried along with the person, the collected data of Android-related analysis [9]–[13], relatively few gives a deep insight into the life of the smartphone studies have been conducted in the field of Apple iOS. owner, and is therefore highly privacy relevant. This might be attributable to the fact that iOS is a closed system that provides hardly any interfaces, and analyze more than 500 apps a day (depending on the information about internals generally need to be reverse desired level of detail). engineered. DiOS allows for structured exploration and navi- Szydlowski et al. [14] discussed general challenges gation of an app’s UI by leveraging the automated of dynamically analyzing iOS apps. Within a prototype UI testing support provided by the official Apple implementation, they tracked sensitive API calls us- development tools. Originally, this feature was intended ing debugger breakpoints and tried to automatically to simplify UI tests during an app’s development explore an app’s user interface (UI) via VNC by recog- phase. However, we successfully reverse engineered nizing image patterns. In general, the practicability of the inner workings to retrofit even existing App Store these approaches is questionable due to performance apps to make use of Apple’s UI automation features impacts that are to be expected and, as the authors [17]. This allowed us to investigate several robust UI admit, due to the inaccuracy of this approach to handle exploration strategies that simulate user interaction non-uniform user interfaces. and thus optimize an app’s UI coverage. We show that Joorabchi and Mesbah [15] propose iCrawler, a tool our automatic interface navigation achieves comparable that explores an app’s UI and generates a model of high coverage results to manual app usage. different UI states to facilitate reverse engineering of One of the core features of DiOS is its pluggable iOS apps. Although the achieved coverage of their architecture. While apps are automatically executed navigation technique looks promising when applied on and user interaction is simulated using smart execution a few open-source apps, it does not support simulation strategies, any analysis component can be integrated of any advanced gestures or external events. Moreover, easily. To demonstrate its practicability and reliability, the technique used by iCrawler is only applicable to we analyzed 1,136 top free apps from the iOS App standard UI elements, and, most notably, iCrawler has Store and tracked privacy-related API calls as well as not been designed to perform privacy analysis. network connections. To summarize, this report makes the following Within PiOS, Egele et al. [16] employ data flow analysis and slicing techniques to detect whether an contributions: We present a fully automated dynamic analysis iOS application leaks sensitive data. As of this writing, • the results published within the PiOS study are the platform for iOS apps. We present a way to automatically purchase apps first and yet only large-scale analysis results on the • privacy landscape of iOS apps. However, contrary to from the official iOS App Store and to schedule our approach PiOS is based on static analysis and them to physical iOS devices for large-scale privacy prone to shortcomings such as statically resolving analysis. We present a novel and robust approach to perform message destinations. So overall, there appears to exist • no publicly scrutinizable solution for dynamic privacy automated UI exploration of iOS apps and explore analysis of iOS apps to date. the merits of different UI execution strategies. Finally, we present the results of a large-scale • dynamic privacy analysis of 1,136 iOS apps from C. Contributions Apple’s App Store. We wish to improve the state of the art in iOS As we wish to enable other researchers to advance privacy analysis by introducing DiOS. To the best of our the field of iOS application security based on our knowledge, DiOS is the first fully automated scalable framework, the full source code of DiOS, as well as solution to perform dynamic privacy analysis of iOS videos demonstrating DiOS in action, are available from apps. our project site: https://www1.cs.fau.de/dios/. As apps from the official Apple App Store are compiled for ARM only (and protected by Apple digital D. Roadmap rights management), and there exists no emulator for This report is structured as follows: In Section II, the iOS platform, DiOS schedules apps from Apple’s we provide relevant background information on Apple App Store for dynamic privacy analysis to physical iOS iOS, its basic security concepts and the UI Automation devices. The analysis throughput scales almost linearly feature. In Section III, we explain the basic architecture with the number of iPhones added to the system. With of the DiOS analysis framework as well as the chal- only four such devices we were able to dynamically lenges we had to overcome to automatically initiate app purchases and to simulate user interaction. Moreover, was to provide users with a service to browse and we present different execution strategies integrated into download apps, it also serves as a unique security DiOS for automated UI exploration. In

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    17 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us