Show simple item record

AuthorShao R.
AuthorRastogi V.
AuthorChen Y.
AuthorPan X.
AuthorGuo G.
AuthorZou S.
AuthorRiley R.
Available date2020-02-24T08:57:13Z
Publication Date2018
Publication NameIEEE Transactions on Mobile Computing
ResourceScopus
ISSN15361233
URIhttp://dx.doi.org/10.1109/TMC.2018.2809727
URIhttp://hdl.handle.net/10576/12994
AbstractMobile users are increasingly becoming targets of malware infections and scams. In order to curb such attacks it is important to know how these attacks originate. We take a previously unexplored step in this direction. Numerous in-app advertisements work at this interface: when the user taps on the advertisement, she is led to a web page which may further redirect until the user reaches the final destination. Even though the original applications may not be malicious, the Web destinations that the user visits could play an important role in propagating attacks. We develop a systematic static analysis methodology to find ad libraries embed in applications and dynamic analysis methodology consisting of three components related to triggering web links, detecting malware and scam campaigns, and determining the provenance of such campaigns reaching the user. Our static analysis system identified 242 different ad libraries and dynamic analysis system was deployed for a two-month period and analyzed over 600,000 applications while triggering a total of about 1.5 million links in applications to the Web. We gain a general understanding of attacks through the app-web interface and make several interesting findings including a rogue antivirus scam, free iPad scams, and advertisements propagating SMS trojans
SponsorThe authors thank our reviewers for their valuable comments. This paper was made possible by the National Natural Science Foundation of China under Grant No.61472209, by the US National Science Foundation under Grant CNS-1408790. The statements made herein are solely the responsibility of the authors.
Languageen
PublisherInstitute of Electrical and Electronics Engineers Inc.
Subjectad libraries
app-web interface
Malware
TitleUnderstanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface
TypeArticle
Pagination2675 - 2688
Issue Number11
Volume Number17


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record