In the Internet of Things (IoT) era users want to be able to access to their accounts on all their devices—e.g., laptops, smartphones, smart TVs, smartwatches, tablets, and so on—and a number of security and privacy concerns have to be addressed. In particular, passwords are widely used to protect sensitive data or to gain access to specific resources. Thus, they have to be stored safely and picked up easily. A possible solution to this issue is to adopt a password manager to remember and secure them. However, a bad user practice, i.e., rooting devices, might affect the security of installed apps. In this scenario, unintended data leakage flaws might exist. In order to detect such flaws, we analyze the top installed Android password managers running them on rooted devices. We will show that a simple malicious application might collect secret data, thus providing an access door into a specific network and all the information stored on it.

Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers / L. Casati, A. Visconti (ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING). - In: Innovative Mobile and Internet Services in Ubiquitous Computing / [a cura di] L. Barolli, T. Enokido. - [s.l] : Springer, 2017. - ISBN 978-3-319-61541-7. - pp. 952-958 (( Intervento presentato al 11. convegno International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing tenutosi a Torino nel 2017 [10.1007/978-3-319-61542-4_96].

Exploiting a Bad User Practice to Retrieve Data Leakage on Android Password Managers

A. Visconti
Ultimo
2017

Abstract

In the Internet of Things (IoT) era users want to be able to access to their accounts on all their devices—e.g., laptops, smartphones, smart TVs, smartwatches, tablets, and so on—and a number of security and privacy concerns have to be addressed. In particular, passwords are widely used to protect sensitive data or to gain access to specific resources. Thus, they have to be stored safely and picked up easily. A possible solution to this issue is to adopt a password manager to remember and secure them. However, a bad user practice, i.e., rooting devices, might affect the security of installed apps. In this scenario, unintended data leakage flaws might exist. In order to detect such flaws, we analyze the top installed Android password managers running them on rooted devices. We will show that a simple malicious application might collect secret data, thus providing an access door into a specific network and all the information stored on it.
Password manager; Data leakage; Mobile app; Rooted device; Hooking; Code injection
Settore INF/01 - Informatica
2017
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
Casati_Visconti_IMIS2017_2Colonne.pdf

accesso riservato

Tipologia: Pre-print (manoscritto inviato all'editore)
Dimensione 144.65 kB
Formato Adobe PDF
144.65 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/514080
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? 0
social impact