Understanding open ports in Android applications: Discovery, diagnosis, and security assessment

Open TCP/UDP ports are traditionally used by servers to provide application services, but they are also found in many Android apps. In this paper, we present the first open-port analysis pipeline, covering the discovery, diagnosis, and security assessment, to systematically understand open ports in...

Full description

Saved in:
Bibliographic Details
Main Authors: WU, Daoyuan, GAO, Debin, CHANG, Rocky K. C., HE, En, CHENG, Eric K. T., DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2019
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4317
https://ink.library.smu.edu.sg/context/sis_research/article/5320/viewcontent/ndss19.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5320
record_format dspace
spelling sg-smu-ink.sis_research-53202019-03-15T02:41:42Z Understanding open ports in Android applications: Discovery, diagnosis, and security assessment WU, Daoyuan GAO, Debin CHANG, Rocky K. C. HE, En CHENG, Eric K. T. DENG, Robert H. Open TCP/UDP ports are traditionally used by servers to provide application services, but they are also found in many Android apps. In this paper, we present the first open-port analysis pipeline, covering the discovery, diagnosis, and security assessment, to systematically understand open ports in Android apps and their threats. We design and deploy a novel on-device crowdsourcing app and its server-side analytic engine to continuously monitor open ports in the wild. Over a period of ten months, we have collected over 40 million port monitoring records from 3,293 users in 136 countries worldwide, which allow us to observe the actual execution of open ports in 925 popular apps and 725 built-in system apps. The crowdsourcing also provides us a more accurate view of the pervasiveness of open ports in Android apps at 15.3%, much higher than the previous estimation of 6.8%. We also develop a new static diagnostic tool to reveal that 61.8% of the open-port apps are solely due to embedded SDKs, and 20.7% suffer from insecure API usages. Finally, we perform three security assessments of open ports: (i) vulnerability analysis revealing five vulnerability patterns in open ports of popular apps, e.g., Instagram, Samsung Gear, Skype, and the widely-embedded Facebook SDK, (ii) inter-device connectivity measurement in 224 cellular networks and 2,181 WiFi networks through crowdsourced network scans, and (iii) experimental demonstration of effective denial-of-service attacks against mobile open ports. 2019-02-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4317 info:doi/10.14722/ndss.2019.23171 https://ink.library.smu.edu.sg/context/sis_research/article/5320/viewcontent/ndss19.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
WU, Daoyuan
GAO, Debin
CHANG, Rocky K. C.
HE, En
CHENG, Eric K. T.
DENG, Robert H.
Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
description Open TCP/UDP ports are traditionally used by servers to provide application services, but they are also found in many Android apps. In this paper, we present the first open-port analysis pipeline, covering the discovery, diagnosis, and security assessment, to systematically understand open ports in Android apps and their threats. We design and deploy a novel on-device crowdsourcing app and its server-side analytic engine to continuously monitor open ports in the wild. Over a period of ten months, we have collected over 40 million port monitoring records from 3,293 users in 136 countries worldwide, which allow us to observe the actual execution of open ports in 925 popular apps and 725 built-in system apps. The crowdsourcing also provides us a more accurate view of the pervasiveness of open ports in Android apps at 15.3%, much higher than the previous estimation of 6.8%. We also develop a new static diagnostic tool to reveal that 61.8% of the open-port apps are solely due to embedded SDKs, and 20.7% suffer from insecure API usages. Finally, we perform three security assessments of open ports: (i) vulnerability analysis revealing five vulnerability patterns in open ports of popular apps, e.g., Instagram, Samsung Gear, Skype, and the widely-embedded Facebook SDK, (ii) inter-device connectivity measurement in 224 cellular networks and 2,181 WiFi networks through crowdsourced network scans, and (iii) experimental demonstration of effective denial-of-service attacks against mobile open ports.
format text
author WU, Daoyuan
GAO, Debin
CHANG, Rocky K. C.
HE, En
CHENG, Eric K. T.
DENG, Robert H.
author_facet WU, Daoyuan
GAO, Debin
CHANG, Rocky K. C.
HE, En
CHENG, Eric K. T.
DENG, Robert H.
author_sort WU, Daoyuan
title Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
title_short Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
title_full Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
title_fullStr Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
title_full_unstemmed Understanding open ports in Android applications: Discovery, diagnosis, and security assessment
title_sort understanding open ports in android applications: discovery, diagnosis, and security assessment
publisher Institutional Knowledge at Singapore Management University
publishDate 2019
url https://ink.library.smu.edu.sg/sis_research/4317
https://ink.library.smu.edu.sg/context/sis_research/article/5320/viewcontent/ndss19.pdf
_version_ 1770574618414809088