Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing

  • Haoyu MA
  • , Shijia LI
  • , Debin GAO
  • , Daoyuan WU
  • , Qiaowen JIA
  • , Chunfu JIA*
  • *Corresponding author for this work

Research output: Journal PublicationsJournal Article (refereed)peer-review

8 Citations (Scopus)

Abstract

App repackaging has raised serious concerns to the Android ecosystem with the repackage-proofing technology attracting attention in the Android research community. In this article, we first show that existing repackage-proofing schemes rely on a flawed security assumption, and then propose a new class of active warden attack that intercepts and falsifies the metrics used by repackage-proofing for detecting the integrity violations during repackaging. We develop a proof-of-concept toolkit to demonstrate that all the existing repackage-proofing schemes can be bypassed by our attack toolkit. On the positive side, our analysis further identifies a new integrity metric in the Android ART runtime that can robustly and efficiently indicate bytecode tampering caused by either repackaging or active warden attacks. By associating this new metric with two supplemental verification mechanisms, we construct a multi-party verification framework that significantly raises the bar of repackage-proofing and identify conditions under which the proposed framework could detect app repackaging without getting compromised by active warden attacks.

Original languageEnglish
Article number9502562
Pages (from-to)3508-3520
Number of pages13
JournalIEEE Transactions on Dependable and Secure Computing
Volume19
Issue number5
Early online date30 Jul 2021
DOIs
Publication statusPublished - 2 Sept 2022
Externally publishedYes

Bibliographical note

Acknowledgments:
The authors would like to thank the anonymous reviewers and the associate editor for providing valuable feedbacks that helped improving this paper.

Publisher Copyright:
© 2004-2012 IEEE.

Funding

This work was supported in part by the National Key R&D Program of China under Grant 2018YFA0704703, in part by the National Natural Science Foundation of China under Grants 61972215 and 61972073, in part by the Natural Science Foundation of Tianjin under Grant 20JCZDJC00640, and in part by the Singapore National Research Foundation, National Satellite of Excellence in Mobile Systems Security and Cloud Security, under Grant NRF2018NCR-NSOE004-0001.

Keywords

  • Android security
  • app repackage-proofing
  • active warden attack

Fingerprint

Dive into the research topics of 'Active Warden Attack: On the (In)Effectiveness of Android App Repackage-Proofing'. Together they form a unique fingerprint.

Cite this