Generating Smartphone Phishing Applications for Deception Based Defense

Generating Smartphone Phishing Applications for Deception Based Defense

Generating smartphone phishing applications for deception based defense BY KRUTI SHARMA B.E., Rajiv Gandhi Proudyogiki Vishwavidyalaya, India, 2010 THESIS Submitted as partial fulfillment of the requirements for the degree of Master in Computer Science in the Graduate College of the University of Illinois at Chicago, 2017 Chicago, Illinois Defense Committee: Dr. Mark Grechanik, Chair and Advisor Dr. Aravinda Prasad Sistla Dr. Chris Kanich Dr. Mohak Shah, Bosch Research ACKNOWLEDGMENTS First of all, I would like to thank my advisor Professor Mark Grechanik for giving me the opportu- nity to work under him as his Research Assistant. Research field was entirely new for me and with his guidance I was able to work in this thesis. I would also like to thank my committee members - Professor Aravinda Sistla, Professor Chris Kanich and Dr. Mohak Shah for taking out their valuable time and served as committee members for my Master’s thesis. ii KS Contribution of Authors The subsections: Overview of GUI and Background on the GUI Structure have been referenced from Dr. Mark Grechanik’s previously published work [45, 66–69, 123] and Dr. Grechanik has authorized me to use the content as published by him in my master’s thesis. The subsection Overview of GUI gives a general idea about the interface used across all the operating systems/platforms and helps my thesis work to give a general idea about the interface. The subsection Background on the GUI Structure helps my thesis work to elaborate on the general architecture of interface across different platform. iii TABLE OF CONTENTS CHAPTER PAGE 1 Introduction . 1 1.1 Mobile app Overview . 2 1.2 Overview of GUI . 5 1.3 Background on the GUI Structure . 6 1.4 Android User Interface Overview . 7 1.5 Architecture of Accessibility Framework in Android . 11 1.6 Accessibility Service . 11 1.7 Accessibility Events . 14 1.8 Android Permissions Model . 15 1.9 The Attacker Model . 16 1.10 Our Contribution . 18 2 Background and Related Work . 20 3 Motivation, Challenges, and Proposed Framework . 23 4 Solution . 26 4.1 Assumptions . 26 4.2 GUI Extraction . 27 4.3 Implementation details of Accessibility Service . 30 4.4 Phishing: GUI Creation . 34 4.5 GUI Analysis . 43 5 Experimental Results . 52 5.1 Tree Edit Distance Algorithm Overview . 63 5.2 Results from other apps . 66 5.3 Snapshots comparing Original vs Phished GUIs . 68 6 Conclusion . 70 References . 71 Appendix . 81 VITA.............................................. 82 iv LIST OF TABLES TABLE PAGE I GITHUB DOWNLOADED APPLICATIONS OVERVIEW . 44 II GRAPHICAL USER INTERFACE, HIERARCHY AND ACCESSIBILITY LOG ANAL- YSIS FOR GITHUB DOWNLOADED APPS . 66 v LIST OF FIGURES FIGURE PAGE 1 Mobile App Example . 2 2 CitiBank Mobile App Snapshot . 4 3 Framework Model . 5 4 Android UI Hierarchy . 7 5 Using assistive technologies (MA2Ps) in attacks on Users With Disabilities (UWD) . 17 6 A model of GUI accessibility. 26 7 Andlytics App: Original App Screen . 35 8 Andlytics App: File created from AS sample Log . 35 9 Test Activity for analyzing Phished GUIs . 36 10 Chase Bank: Comparing Original Vs Phished App . 48 11 CitiBank: Comparing Original Vs Phished App . 51 12 Android Project Structure Part - 1 . 52 13 Android Full Project Structure . 54 14 Hierarchy Viewer GUI analysis . 57 15 Hierarchy Viewer Layout analysis . 57 16 Comparing XML Log for Login Activity . 64 17 Comparing Login Activity - Snapshots . 65 18 Accessibility Log for Login Activities. 65 19 Original vs Phished GUI for Andlytics App . 68 20 Original vs Phished GUI for Commons App . 69 21 Original vs Phished GUI for SmartGadget App . 69 vi LIST OF ABBREVIATIONS MA2P Mobile Assistive APplications UWD Users With Disability AS Accessibility Services GUI Graphical User Interface GAP Graphical User Interface- based APplication App Application vii SUMMARY Graphical User Interface (GUI)-based APplications (GAPs) are ubiquitous, both in business and personal use and they are deployed on diverse software and hardware platforms. Unfortunately, close to 50Mil people have disabilities in the USA alone and over 600Mil worldwide, and it is difficult for Users With Disabilities (UWDs) to work with GAPs on their smartphones. Since there are hundreds of disabilities that impair people in vision, movement, thinking, remembering, learning, communicating, and hearing, UWDs need specialized enhancements to GUIs. Mobile Assistive APplications (MA2Ps) provide these enhancement services using specialized accessibility technologies that are fundamen- tally insecure, thus exposing all smartphone users to a variety of attacks. The goal of this framework is therefore to investigate security problems with accessibility technologies and to explore a novel theoretical foundation to allow stakeholders to create, analyze, and predict the security and privacy behavior of complex MA2Ps for UWDs. A connecting thread in the research thrusts is a combination of GAP and MA2P modeling and compositional intercomponent analysis using these models to create a prototype that can predict and mitigate security threats posed by accessiblity technologies for smartphone users. Also, the results of the proposed framework should inform the GUI security and assistive technologies communities about the possibilities and limits of program analyses and machine learning in dealing with security problems posed by accessibility technologies that make users unsafe. Key Words: graphical user interface, security, program analysis, assistive technologies, smartphone apps viii 1 1. Introduction All major operating systems on smartphones provide the accessibility service for creating Mobile- Assistive APplications (MA2Ps) for Users With Disabities (UWDs). Since there are hundreds of dis- abilities that impair people in vision, movement, thinking, remembering, learning, communicating, and hearing, UWDs need assistance in using Graphical User Interface (GUI)-based APplications (GAPs) by enhancing their GUIs [45, 66–69], and MA2Ps provide these enhancement services. Google Play Store has thousands of applications that requests for Accessibility Service [80, 85] and two applications which have a rating of 4.3 out of 5 [104, 116] are popular and have been downloaded by more than ten million users. Making GAPs accessible for UWDs is extremely important nowa- days [97], since GAPs are ubiquitous, both in business and personal use and they are deployed on di- verse software and hardware platforms [34,77] including TVs and cars [37]. Making GAPs accessible for users with various types of disabilities is legally required [63, 92], and a large MA2P marketplace exists where there is no control over how applications use accessibility services. On the 4th March, of the past year 2016, it was announced that an evolutionary malware that exploits the accessibility service using clickjacking impacted more than half a billion Android devices globally [29,30,42,61,87,90,108,109,128,129]. A report at the annual cyber-security RSA conference stated: “this very modern mobile malware had the capability to not be detected in scanner detection, which is usually based on signatures, static and dynamic analysis approaches.” The malware can steal all sensitive information and take automated actions using other applications and even the operating system. On the 5th of May 2016, Symantec announced that Android banking malware tricks users into turning on the accessibility service, so that it can steal sensitive information from all users, not just from UWDs [126]. Moreover, security researchers from Symantec reported that the protection that Google released in May was not fool proof [127]. As of the 18th of May 2016 it is confirmed that the attack is not limited to older versions of Android and over 95% of Android devices are under this rapidly expanding threat [59]. Different attacks that use accessibility services were reported as early as in November last year [46] although security weaknesses of the accessiblity services were discussed as early as 2014 [88], and these attacks are expanding on a massive scale. If accessibility services are enabled, then applications with accessibility permissions are allowed to interact with GUIs on behalf of the user 2 and do almost anything that the user can do and currently there is no protection against this attack. 1.1 Mobile app Overview A Mobile App is a software application designed to run on mobile devices such as smartphones and tablet comput- ers [121]. These apps allow users to access different ap- plications easily on their smartphones like calendar, email etc. Different variety of platforms/operating systems like IOS, Android, Windows, Blackberry have an in-built sup- port for many apps and extra set of apps may be installed from app stores. These apps are designed to provide users with services that they can access on their PCs [17]. Each app has specific and limited functions that it can perform Figure 1: Mobile App Example [15] and is designed to support the limited hardware and mem- ory resources of a smartphone. Each smartphone can have any number of apps (highly depends on the memory and support given by each smartphones platform) ranging from providing weather forecast services to allowing users to access their mailbox. For example, as shown in Firgure: 1, there can be mulitple apps with some in- built provided by the platforms and other may be downloaded. The popularity of Google’s Android has been increasing and is popularly accepted operating system for many smartphones [21]. There are around 2,600,000 apps [18] available for users to download from Google Play Store - the official market for publishing and downloading android apps. The variety of apps available for user’s ranges from basic apps such as calendar, email to important apps such as banking/financial apps. The apps are designed specifically for smartphones, providing a compatible view and an easy one click for accessing them. But how do the services and operations of a website varies on laptop and smartphone. There are various differences like: 1 The memory, computing power, hardware and software resources of a smartphone is very less as compared to a laptop or PC.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    90 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us