Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Denial-of-app attack: Inhibiting the installation of Android apps on stock phones

: Arzt, Steven; Huber, Stephan; Rasthofer, Siegfried; Bodden, Eric


Association for Computing Machinery -ACM-; Association for Computing Machinery -ACM-, Special Interest Group on Security, Audit and Control -SIGSAC-:
SPSM 2014, 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. Proceedings : In conjunction with the 21st ACM Conference on Computer and Communications Security, CCS 2014, November 3-7, 2014, Scottsdale, Arizona, USA
New York: ACM, 2014
ISBN: 978-1-4503-3155-5
Workshop on Security and Privacy in Smartphones & Mobile Devices (SPSM) <4, 2014, Scottsdale/Ariz.>
Conference on Computer and Communications Security (CCS) <21, 2014, Scottsdale/Ariz.>
Conference Paper
Fraunhofer SIT ()

We describe a novel class of attacks called denial-of-app that allows adversaries to inhibit the future installation of attacker-selected applications on mobile phones. Adversaries can use such attacks to entrap users into installing attacker-preferred applications, for instance to generate additional revenue from advertisements on a competitive app market or to increase the rate of malware installation. Another possibility is to block anti-virus applications or security workarounds to complicate malware detection and removal. We demonstrate such an attack that works on arbitrary unmodified stock Android phones. It is even possible to block many applications from a list predefined by the attacker instead of just a single app. Even more, we propose an attack for banning applications from Google Play Store regardless of the user's phone by exploiting similar vulnerabilities in the market's app vetting process. Unblocking an application blocked by our attack requires either root privileges or a complete device reset. The Android security team has confirmed and fixed the vulnerability in Android 4.4.3 (bug 13416059) and has given consent to this publication within a responsible-disclosure process. To the best of our knowledge, the attack applies to all versions prior to Android 4.4.3.