Vulnerabilities / Threats
11/4/2015
05:20 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

AndroBugs: A Framework For Android Vulnerability Scanning

At Black Hat Europe next week, a researcher will present a framework he says is more systematic than the vulnerability scanners popping up on the market.

The Android ecosystem is a Wild West where vulnerabilities can run rampant, and go undiscovered, unchecked, and unfixed. It's hard to corral, but a researcher at Black Hat Europe in Amsterdam next week will present a new framework to help make the process of locating vulnerabilities in Android apps and libraries more efficient and more accurate.

Yu-Cheng Lin, software engineer on the security team at MediaTek, will introduce the “AndroBugs Framework: An Android Application Security Vulnerability Scanner.”

"I found that the same mistakes are being made again and again by Android developers," Lin says. "So I believe probably I can find many security vulnerabilities if I use a systematic way. And actually, the results (vulnerabilities found) from AndroBugs Framework exceeded my expectation."

There are other tools that help Android developers write clean code. Google's Android integrated development environment includes a tool called Lint -- but mostly it finds coding errors, not security weaknesses. There are also some Android vulnerability scanners hitting the market.

Lin says his framework is different.

Instead of just scanning the code for weak spots, AndroBugs tries to emulate the operation of an app, and considers the attack vectors through which those weaknesses would be exploited.

"I think the biggest difference from those tools is the ways that AndroBugs Framework plays with the vulnerability vectors," says Lin.  "... The analysis report from AndroBugs Framework is prioritize, which means it tries not to print the useless information."

Also, AndroBugs stores all its analyses in the NoSQL database and includes tools for users to query the NoSQL database by vector. That can reduce the effort for developers and security pros looking for vulns.

"So if I want to find vulnerabilities among lots of applications (e.g. more than 100,000 apps)," he says. "I will do the massive scanning with AndroBugs Framework first. ... It truly helps you reduce the efforts of finding vulnerabilities and you no longer need to review the code line by line."

When AndroBugs analyzes an app, it scans for vulnerabilities in the third-party libraries/SDKs it uses, too. 

"If a vulnerability is found in a SDK, it’s a disaster," says Lin. "First, it may be used by many applications. Second, unlike system upgrade, the Android developers may not upgrade the libraries they are using."

The good news is that it's actually easier for the AndroBugs Framework to find SDK vulns than others. "If those vulnerable libraries are used by many applications, you actually can find those vulnerable libraries with AndroBugs Framework immediately because lots of applications will use them," Lin says. "So I think the vulnerabilities in SDKs will get fixed faster."

They may be fixed faster, he notes, but that doesn't mean that the Android developers will update and upgrade appropriately, so security problems can still perpetuate themselves within the Android environment -- something Lin doubts will ever change. 

"I think Google will never make [app security] an enforcement or rate the security of an app," he says. "I think Google will never take down the vulnerable apps from Google Play. It’s a political problem. I think Google already knows some security problems in Android applications. But there are too many applications that use the vulnerable APIs."

This is why Lin -- who has also been an Android developer -- uses an iPhone.

Lin says that he hopes AndroBugs will help improve Android security, but he also suggests that companies give mobile security the same attention they give Web security; that Android security researchers exercise responsible disclosure; and that companies acknowledge, not ignore, the vulnerability reports they receive.

The AndroBugs Framework will be released, open-source, on GitHub before Black Hat Europe. A Windows version is also forthcoming.

Black Hat Europe returns to the beautiful city of Amsterdam, Netherlands November 12 & 13, 2015. Click here for more information and to register.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.