论文标题

在Android平台中剖析接触式跟踪应用程序

Dissecting contact tracing apps in the Android platform

论文作者

Kouliaridis, Vasileios, Kambourakis, Georgios, Chatzoglou, Efstratios, Geneiatakis, Dimitrios, Wang, Hua

论文摘要

从历史上看,接触跟踪已被用来阻碍传染病的传播,但是如果大规模手工锻炼它,则众所周知,它是一种资源密集型且非常不足的过程。如今,在全球与冠状病毒大流行的斗争中,数字接触追踪已成为必不可少的资产。手头的工作提供了一项细致的研究,对欧洲国家迄今为止部署的所有官方Android接触跟踪应用程序。每个应用程序都通过动态仪器在静态和动态上仔细检查。根据检查水平,将静态分析结果分为两个轴。第一个涵盖了权限,API调用以及与外部URL的可能连接,而第二个则集中于潜在的安全弱点和漏洞,包括使用跟踪器,深入的明显分析,共享软件分析和污点分析。另一方面的动态分析收集与Java类和网络流量有关的数据。结果表明,尽管总体而言,这些应用程序进行了精心设计,但它们并非没有弱点,脆弱性和错觉,最终可能会使用户安全和隐私处于危险之中。

Contact tracing has historically been used to retard the spread of infectious diseases, but if it is exercised by hand in large-scale, it is known to be a resource-intensive and quite deficient process. Nowadays, digital contact tracing has promptly emerged as an indispensable asset in the global fight against the coronavirus pandemic. The work at hand offers a meticulous study of all the official Android contact tracing apps deployed hitherto by European countries. Each app is closely scrutinized both statically and dynamically by means of dynamic instrumentation. Depending on the level of examination, static analysis results are grouped in two axes. The first encompasses permissions, API calls, and possible connections to external URLs, while the second concentrates on potential security weaknesses and vulnerabilities, including the use of trackers, in-depth manifest analysis, shared software analysis, and taint analysis. Dynamic analysis on the other hand collects data pertaining to Java classes and network traffic. The results demonstrate that while overall these apps are well-engineered, they are not free of weaknesses, vulnerabilities, and misconfigurations that may ultimately put the user security and privacy at risk.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源