z-logo
open-access-imgOpen Access
Borrowing your enemy’s arrows: the case of code reuse in Android via direct inter-app code invocation
Author(s) -
Jun Gao,
Li Li,
Pingfan Kong,
Tegawendé F. Bissyandé,
Jacques Klein
Publication year - 2020
Publication title -
open repository and bibliography (university of luxembourg)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/3368089.3409745
Subject(s) - android (operating system) , computer science , reuse , java , code reuse , world wide web , code (set theory) , operating system , database , software , programming language , set (abstract data type) , ecology , biology
The Android ecosystem offers different facilities to enable communication among app components and across apps to ensure that rich services can be composed through functionality reuse. At the heart of this system is the Inter-component communication (ICC) scheme, which has been largely studied in the literature. Less known in the community is another powerful mechanism that allows for direct inter-app code invocation which opens up for different reuse scenarios, both legitimate or malicious. This paper exposes the general workflow for this mechanism, which beyond ICCs, enables app developers to access and invoke functionalities (either entire Java classes, methods or object fields) implemented in other apps using official Android APIs. We experimentally showcase how this reuse mechanism can be leveraged to “plagiarize" supposedly-protected functionalities. Typically, we were able to leverage this mechanism to bypass security guards that a popular video broadcaster has placed for preventing access to its video database from outside its provided app. We further contribute with a static analysis toolkit, named DICIDer, for detecting direct inter-app code invocations in apps. An empirical analysis of the usage prevalence of this reuse mechanism is then conducted. Finally, we discuss the usage contexts as well as the implications of this studied reuse mechanism.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom