Mobile Apps Bring Security Woes

Tuesday, March 20, 2012 @ 12:03 PM gHale

As mobile devices gain a stronger foothold in the manufacturing automation industry, a new study shows including advertisements in mobile applications brings additional privacy and security risks.

In a recent study of 100,000 apps in the official Google Play market, researchers noticed more than half contained ad libraries. And 297 of the apps included aggressive ad libraries enabled to download and run code from remote servers – which raises significant privacy and security concerns, according to the research from North Carolina State University.

Few Strong Android Malware Scanners
Smart Phones ‘Leak’ Crypto Keys
Smartphone Security Faces Big Problem
DDoS Tool Heads to Android

“Running code downloaded from the Internet is problematic because the code could be anything,” said Dr. Xuxian Jiang, an assistant professor of computer science at NC State and co-author of a paper describing the work. “For example, it could potentially launch a ‘root exploit’ attack to take control of your phone – as demonstrated in a piece of Android malware called RootSmart.”

In Google Play (formerly known as the Android Market) and other markets, developers offer free apps. To generate revenue, these app developers incorporate “in-app ad libraries,” provided by Google, Apple or other third-parties. These ad libraries retrieve advertisements from remote servers and run the ads on a user’s smartphone periodically. Every time an ad runs, the app developer receives a payment.

This poses potential problems because the ad libraries receive the same permissions the user granted to the app itself when they installed it – regardless of whether the user was aware he or she was granting permissions to the ad library.

Jiang’s team looked at a sample of 100,000 apps available on Google Play between March and May 2011 and examined the 100 representative ad libraries used by those apps. One significant find was 297 of the apps (1 out of every 337 apps) used ad libraries “that made use of an unsafe mechanism to fetch and run code from the Internet – a behavior that is not necessary for their mission, yet has troubling privacy and security implications,” Jiang said. But that is only the most extreme example.

Jiang’s team found 48,139 of the apps (1 in 2.1) had ad libraries that track a user’s location via GPS, presumably to allow an ad library to better target ads to the user. However, 4,190 apps (1 in 23.4) used ad libraries that also allowed advertisers themselves to access a user’s location via GPS. Other information accessed by some ad libraries included call logs, user phone numbers and lists of all the apps a user has stored on his or her phone.

These ad libraries pose security risks because they offer a way for third parties – including hackers – to bypass existing Android security efforts. Specifically, the app itself may be harmless, so it won’t trigger any security concerns. But the app’s ad library may download harmful or invasive code after installation.

“To limit exposure to these risks, we need to isolate ad libraries from apps and make sure they don’t have the same permissions,” Jiang said. “The current model of directly embedding ad libraries in mobile apps does make it convenient for app developers, but also fundamentally introduces privacy and security risks. The best solution would be for Google, Apple and other mobile platform providers to take the lead in providing effective ad-isolation mechanisms.”

Leave a Reply

You must be logged in to post a comment.