Identifying and Mitigating Misuse of Secrets in Android with Dynamic Analysis Techniques

dc.contributor.advisorWallach, Dan Sethen_US
dc.creatorLee, Jaehoen_US
dc.date.accessioned2019-11-25T13:51:00Zen_US
dc.date.available2019-11-25T13:51:00Zen_US
dc.date.created2019-12en_US
dc.date.issued2019-11-22en_US
dc.date.submittedDecember 2019en_US
dc.date.updated2019-11-25T13:51:01Zen_US
dc.description.abstractMobile phones have been completely changing the way people think and behave, making our lives convenient. At the same time, this accelerated growth has brought with it unprecedented new threats related to user privacy. A myriad of apps in Android phones are handling various user data. However, each app developer has the principle responsibility to protect them because the Android framework lacks direct support for them. This is not good news, because developers have varying levels of secure coding practice, and the resulting apps may inadvertently misuse of sensitive data of users. In this thesis, I will present my studies with various Android apps and the Android framework to understand the misuse of secrets in the mobile environment. To assist my work, I have used various analysis techniques and developed a dynamic analysis framework to perform systematic analyses of Android apps. This dissertation describes approaches and tools I have developed, my findings on how sensitive data is misused, and mitigation to address found security problems. Our research has had a significant practical impact and helped to mitigate the misuse of secrets in the mobile ecosystem. Specifically, I designed a memory analysis framework that provides physical and logical memory dumping, along with a high degree of automation of experiments. We have discovered that Android keeps TLS master secret live in memory for an unnecessarily long period of time, posing a threat to all Android applications built on standard HTTPS libraries. I found modest changes to Android codebase could mitigate these issues, and reported to Google. Also, our comprehensive analysis of variety of apps revealed that user passwords can survive in a variety of locations for an extended period of time, including UI widgets where users enter their passwords, apps that retain passwords rather than exchange them for tokens, old copies not yet reused by garbage collectors, keyboard apps, password management apps, and even the lockscreen system service. I have developed solutions that fix these problems and assist apps to follow more secure practices. Lastly, I will present FlowPass, an efficient and informative dynamic taint tracking system that I developed. FlowPass found 13 previously unknown security bugs in popular apps that have each been installed more than one million times. I have reported these misuses to the app vendors, and most have fixed the bugs shortly afterward.en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationLee, Jaeho. "Identifying and Mitigating Misuse of Secrets in Android with Dynamic Analysis Techniques." (2019) Diss., Rice University. <a href="https://hdl.handle.net/1911/107734">https://hdl.handle.net/1911/107734</a>.en_US
dc.identifier.urihttps://hdl.handle.net/1911/107734en_US
dc.language.isoengen_US
dc.rightsCopyright is held by the author, unless otherwise indicated. Permission to reuse, publish, or reproduce the work beyond the bounds of fair use or other exemptions to copyright law must be obtained from the copyright holder.en_US
dc.subjectAndroiden_US
dc.subjectMobile systemen_US
dc.subjectpassworden_US
dc.subjectdynamic analysisen_US
dc.subjectTLSen_US
dc.titleIdentifying and Mitigating Misuse of Secrets in Android with Dynamic Analysis Techniquesen_US
dc.typeThesisen_US
dc.type.materialTexten_US
thesis.degree.departmentComputer Scienceen_US
thesis.degree.disciplineEngineeringen_US
thesis.degree.grantorRice Universityen_US
thesis.degree.levelDoctoralen_US
thesis.degree.nameDoctor of Philosophyen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
LEE-DOCUMENT-2019.pdf
Size:
4.69 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 2 of 2
No Thumbnail Available
Name:
PROQUEST_LICENSE.txt
Size:
5.84 KB
Format:
Plain Text
Description:
No Thumbnail Available
Name:
LICENSE.txt
Size:
2.6 KB
Format:
Plain Text
Description: