see no evil: phishing for permissions with false transparency · see no evil: phishing for...

87
See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter† *Google, †University of Illinois at Urbana-Champaign

Upload: others

Post on 22-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

See No Evil: Phishing for Permissions with False Transparency

Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

*Google, †University of Illinois at Urbana-Champaign

Page 2: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

2

Install-time Permissions < Android 6.0

Page 3: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

2

Install-time Permissions < Android 6.0

lack of context

Page 4: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

2

Install-time Permissions < Android 6.0

Runtime Permissions >= Android 6.0

lack of context

Page 5: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

2

Install-time Permissions < Android 6.0

Runtime Permissions >= Android 6.0

lack of contextmore context

Page 6: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

2

Install-time Permissions < Android 6.0

Runtime Permissions >= Android 6.0

lack of contextmore context

ask on first use from the foreground

Page 7: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

2

Install-time Permissions < Android 6.0

Runtime Permissions >= Android 6.0

lack of contextmore context

ask on first use from the foreground

>75% of the market now uses runtime

permissions

Page 8: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

3

Viber requesting

Page 9: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

3

Viber requesting

Page 10: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

3

Viber requesting

Page 11: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

3

Viber requesting So far so good

Page 12: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

4

Page 13: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

4

Page 14: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

4

Page 15: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

4

Viber requesting?

Page 16: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

4

No?!Viber requesting?

Page 17: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

5

Viber requesting?

Page 18: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

5

Viber requesting?

Page 19: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

5

Viber requesting?

Page 20: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

5

Viber requesting?

Page 21: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

5

Viber requesting?

Page 22: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

5

Viber requesting?False transparency attacks on runtime

permissions

Invisible background app requests permission!

Page 23: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

5

Viber requesting?False transparency attacks on runtime

permissions

Invisible background app requests permission!

Page 24: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

5

Viber requesting?False transparency attacks on runtime

permissions

Invisible background app requests permission!

Affects Android 6-11

Page 25: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

5

False transparency attacks on runtime

permissions

Invisible background app requests permission!

What’s going on?

Affects Android 6-11

Page 26: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†
Page 27: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Breaking the security guarantees of runtime permissions

Page 28: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Contextual Guarantee

Page 29: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

• Users will always be provided with context

Contextual Guarantee

Page 30: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

• Users will always be provided with context

- Allow permission requests to be made only from the foreground

Contextual Guarantee

Page 31: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

• Users will always be provided with context

- Allow permission requests to be made only from the foreground

Contextual Guarantee

Assumption: Context provided by the

FG app is legitimate

Page 32: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

• Users will always be provided with context

- Allow permission requests to be made only from the foreground

Contextual Guarantee

APIs to move within the task stack!

- moveTaskToFront()- moveTaskToBack()- startActivity()- requestPermissions()

Assumption: Context provided by the

FG app is legitimate

Page 33: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

• Users will always be provided with context

- Allow permission requests to be made only from the foreground

Contextual Guarantee

APIs to move within the task stack!

transparency

+

- moveTaskToFront()- moveTaskToBack()- startActivity()- requestPermissions()

Assumption: Context provided by the

FG app is legitimate

Page 34: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

• Users will always be provided with context

- Allow permission requests to be made only from the foreground

Contextual Guarantee

APIs to move within the task stack!

transparency

+

- moveTaskToFront()- moveTaskToBack()- startActivity()- requestPermissions()

Assumption: Context provided by the

FG app is legitimate

Page 35: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

8

Identity Guarantee

Page 36: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

8

Identity Guarantee

• Users should be made aware of the identity of requesting app

Page 37: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

8

Identity Guarantee

• Users should be made aware of the identity of requesting app

- Show app name in the permission dialog

Page 38: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

8

Identity Guarantee

• Users should be made aware of the identity of requesting app

- Show app name in the permission dialog

Assumption:Uniquely identifying

app names

Page 39: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

8

Identity Guarantee

App name

• Users should be made aware of the identity of requesting app

- Show app name in the permission dialog

- no rules!

Assumption:Uniquely identifying

app names

Page 40: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

8

Identity Guarantee

App name

• Users should be made aware of the identity of requesting app

- Show app name in the permission dialog

- no rules!Viber

Assumption:Uniquely identifying

app names

Page 41: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

8

Identity Guarantee

App name

• Users should be made aware of the identity of requesting app

- Show app name in the permission dialog

- no rules!

this app

Viber

Assumption:Uniquely identifying

app names

Page 42: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†
Page 43: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Background apps can request permissions with an illegitimate context

Page 44: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Background apps can request permissions with an illegitimate context

Apps can exploit users’ trust and request permissions impersonating other apps

Page 45: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Realizing the Attacks

Page 46: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Realizing the Attacks

Survey with 200 Amazon mTurk participants

Page 47: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

• Is there any underlying susceptibility enabling FTAs?

Realizing the Attacks

Survey with 200 Amazon mTurk participants

Page 48: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

• Is there any underlying susceptibility enabling FTAs?

• How to make FTAs realistic and more likely to succeed?

Realizing the Attacks

Survey with 200 Amazon mTurk participants

Page 49: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Susceptibility

Page 50: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Susceptibility

Page 51: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Susceptibility

Would you grant this permission?

Page 52: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Susceptibility

Would you grant this permission?

No26%

Yes74%

Page 53: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Susceptibility

Would you grant this permission?

No26%

Yes74%

1 user mentioned request looking fishy

Page 54: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Susceptibility

Page 55: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Susceptibility

Who’s requesting this permission?

Page 56: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Susceptibility

Who’s requesting this permission?

3%2%

2%2%

4%1%

3%

Google Maps84%

Page 57: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Realistic Attacks

Page 58: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Realistic Attacks (1)

Page 59: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Realistic Attacks (1)

WTH?

Users are more likely to deny permission requests with NO app in the foreground

Page 60: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Realistic Attacks (1)

Users are more likely to deny permission requests with NO app in the foreground

Page 61: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Request only when there’s an app in the foreground

Realistic Attacks (1)

Yeah okay.

Users are more likely to deny permission requests with NO app in the foreground

Page 62: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Request only when there’s an app in the foreground

Realistic Attacks (1)

Yeah okay.

Users are more likely to deny permission requests with NO app in the foreground

How: getRunningTasks()

Page 63: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Realistic Attacks (2)

Page 64: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Realistic Attacks (2)

WTH?

Users are more likely to deny if app requests irrelevant permissions

Page 65: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Request only the relevant permissions

Realistic Attacks (2)

Yeah okay.

Users are more likely to deny if app requests irrelevant permissions

Page 66: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Request only the relevant permissions

Realistic Attacks (2)

Yeah okay.

Users are more likely to deny if app requests irrelevant permissions

- Infer the foreground app

Page 67: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Request only the relevant permissions

Realistic Attacks (2)

Yeah okay.

Users are more likely to deny if app requests irrelevant permissions

- Infer the foreground app- Only request permissions

required by this app

Page 68: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Request only the relevant permissions

Realistic Attacks (2)

Yeah okay.

Users are more likely to deny if app requests irrelevant permissions

- Infer the foreground app- Only request permissions

required by this app

How: ProcHarvester

Page 69: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Request only the relevant permissions

Realistic Attacks (2)

Yeah okay.

Users are more likely to deny if app requests irrelevant permissions

- Infer the foreground app- Only request permissions

required by this app

How: ProcHarvester

Page 70: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Request only the relevant permissions

Realistic Attacks (2)

Yeah okay.

Users are more likely to deny if app requests irrelevant permissions

- Infer the foreground app- Only request permissions

required by this app

How: ProcHarvester

- Adapted ProcHarvester to realistic attack scenarios

- 90% accuracy

Page 71: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Feasibility

Page 72: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Feasibility

20 lab participants

Page 73: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Feasibility

20 lab participants

Realistic setting with everyday tasks and popular apps:

Page 74: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Feasibility

20 lab participants

Realistic setting with everyday tasks and popular apps:

None of the participants noticed the attack!

Page 75: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Page 76: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Existing defenses

Page 77: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Background app starts on Android 10

Existing defenses

Page 78: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Background app starts on Android 10

Attacks still work on Android 10 and 11

Existing defenses

Page 79: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Background app starts on Android 10

Attacks still work on Android 10 and 11

Existing defenses

Non-trival solution

Page 80: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Background app starts on Android 10

Attacks still work on Android 10 and 11

Existing defenses

Non-trival solution

Page 81: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Background app starts on Android 10

Attacks still work on Android 10 and 11

Existing defensesRecommendations:

Non-trival solution

Page 82: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Background app starts on Android 10

Attacks still work on Android 10 and 11

Mandatory app transition effectsExisting defenses

Recommendations:

Non-trival solution

Page 83: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Background app starts on Android 10

Attacks still work on Android 10 and 11

App name checks in:

Mandatory app transition effectsExisting defenses

Recommendations:

Non-trival solution

Page 84: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Background app starts on Android 10

Attacks still work on Android 10 and 11

App name checks in:

Additional app identifiers in permission dialogs

Mandatory app transition effectsExisting defenses

Recommendations:

Non-trival solution

Page 85: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Defense and Countermeasures

Background app starts on Android 10

Attacks still work on Android 10 and 11

App name checks in:

Additional app identifiers in permission dialogs

Mandatory app transition effectsExisting defenses

Recommendations:

Non-trival solutionNo more transparent UI

Page 86: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

Thank you!

Page 87: See No Evil: Phishing for Permissions with False Transparency · See No Evil: Phishing for Permissions with False Transparency Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

See No Evil: Phishing for Permissions with False Transparency

Güliz Seray Tuncay*†, Jingyu Qian†, Carl A. Gunter†

*Google, †University of Illinois at Urbana-Champaign