STATIC DETECTION AND AUTOMATIC EXPLOITATION OF INTENT MESSAGE VULNERABILITIES IN ANDROID APPLICATIONS

Black Hat USA 2014

Presented by: Daniele Gallingani
Date: Thursday August 07, 2014
Time: 14:50 - 15:15
Location: South Seas CD

We identified a set of vulnerabilities that common Android Apps programming (mis)practices might introduce.

We developed an effective static analyzer to automatically detect a set of vulnerabilities rising by incorrect Android's Inter-Component Communication usage.

We completed our analysis by automatically demonstrating whether the vulnerabilities identified by static analysis can actually be exploited or not at run-time by an attacker.

We adopted a formal and sound approach to automatically produce malicious payloads able to reproduce the dangerous behavior in vulnerable applications.

The lack of exhaustive sanity checks when receiving messages from unknown sources is the evidence of the underestimation of this problem in real world application development.

Daniele Gallingani

Graduated at UIC in the Computer Science Master Program in May 2013, I worked as a research assistant focusing on research interests related to Android security issues. I am currently a master student at Politecnico di Milano. I also co-founded a company that offers technological consultancy to both startups and consolidated companies.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats