|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS
Jing YU Toshihiro YAMAUCHI
Publication
IEICE TRANSACTIONS on Information and Systems
Vol.E98-D
No.4
pp.807-811 Publication Date: 2015/04/01 Publicized: 2014/12/04 Online ISSN: 1745-1361
DOI: 10.1587/transinf.2014ICL0001 Type of Manuscript: Special Section LETTER (Special Section on Information and Communication System Security―Against Cyberattacks―) Category: Access Control Keyword: Android, WebView, static analysis, access control,
Full Text: PDF(331.3KB)>>
Summary:
Android applications that using WebView can load and display web pages. Interaction with web pages allows JavaScript code within the web pages to access resources on the Android device by using the Java object, which is registered into WebView. If this WebView feature were exploited by an attacker, JavaScript code could be used to launch attacks, such as stealing from or tampering personal information in the device. To address these threats, we propose an access control on the security-sensitive APIs at the Java object level. The proposed access control uses static analysis to identify these security-sensitive APIs, detects threats at runtime, and notifies the user if threats are detected, thereby preventing attacks from web pages.
|
|