信息网络安全 ›› 2017, Vol. 17 ›› Issue (12): 61-66.doi: 10.3969/j.issn.1671-1122.2017.12.011

• • 上一篇    下一篇

基于安全容器的Activity钓鱼劫持防御方案

陈璨璨, 崔浩亮, 张文, 牛少彰   

  1. 北京邮电大学智能通信软件与多媒体北京市重点实验室,北京 100876
  • 收稿日期:2017-08-31 出版日期:2017-12-20 发布日期:2020-05-12
  • 作者简介:

    作者简介:陈璨璨(1993—),女,广西,硕士研究生,主要研究方向为移动通信安全;崔浩亮(1987—),男,河北,博士研究生,主要研究方向为信息安全、漏洞挖掘;张文(1987—),男,四川,博士研究生,主要研究方向为信息安全、移动安全技术;牛少彰(1963—),男,教授,博士,主要研究方向为网络信息安全、网络攻防技术、软件安全、信息隐藏技术等。

  • 基金资助:
    国家自然科学基金[61370195];国家自然科学基金联合基金[U1536121]

A Defense Scheme for Activity Hijack Based on Safe Container

Cancan CHEN, Haoliang CUI, Wen ZHANG, Shaozhang NIU   

  1. Beijing Key Lab of Intelligent Telecommunication Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2017-08-31 Online:2017-12-20 Published:2020-05-12

摘要:

钓鱼劫持作为窃取用户隐私数据的恶意攻击行为,对用户的隐私数据造成了严重的安全威胁。针对钓鱼劫持攻击链中的恶意试探环节,文章提出了利用安全容器将应用与外部环境隔离,使得外部的恶意应用无法获取在容器中运行的应用的状态和在容器中运行的任务栈的栈顶信息,只能获取虚假的代理组件,有效阻止外部的恶意应用对Activity界面进行覆盖。文中方案从钓鱼劫持的攻击流程角度进行分析,设计拦截手段,阻止Activity钓鱼劫持的发生。实验结果表明,文中方案能够有效地为应用提供安全可靠的运行环境,并且不会对系统内核进行修改,保证应用免受Activity钓鱼劫持的恶意攻击。

关键词: 安全容器, 钓鱼劫持, 恶意攻击

Abstract:

As a malicious attack to steal user privacy data, Activity hijack causes serious security threat to user's private data. For the malicious test link of the Activity hijack attacks, this paper puts forward the concept of using safe container operation environment that isolate the application from the external environment. It is hard for malicious attackers to get the running state and the information from the running task about the application running in the safe container, only can get the fake information of the proxy components. So it can prevent external malicious attackers from covering the Activity interface. This scheme is anylyzed from the perspective of Activity hijack attack process, designs interception means to prevent the occurrence of Activity hijack. Experimental results show that our method is available and effective to provide safe and reliable operation environment for the application. What's more, it don't change the kernel of android and can ensure the application from the attacks of Activity hijack.

Key words: security container, hijacked fishing, malicious attacks

中图分类号: