论文标题

一种识别汽车信息娱乐系统中信息泄漏的方法

An Approach for the Identification of Information Leakage in Automotive Infotainment systems

论文作者

Moiz, Abdul, Alalfi, Manar H.

论文摘要

数字化世界的进步彻底改变了汽车行业。当今的现代汽车配备了互联网,可以提供自动驾驶功能的计算机以及可以运行移动操作系统(例如Android Auto和Apple Carplay)的信息娱乐系统。 Android Automotive是Google的Android操作系统,该操作系统量身定制为在车辆的信息娱乐系统上运行,它允许安装第三方应用程序并在车辆的信息娱乐系统上运行。此类应用可能会引起与用户的安全性,安全性和隐私相关的安全问题。本文研究了这些应用程序中的车辆内应用程序的安全问题,这些应用程序与这些应用程序中的组件间通信(ICC)有关。 ICC允许应用程序通过Intra或Intra应用程序组件通过称为意图的消息对象共享信息。如果发生不安全的通信,可能会因恶意应用程序劫持或欺骗意图,并且用户的敏感信息可以泄漏到Hacker的数据库中。我们研究了这些应用程序中的攻击表面和漏洞,并提供了一种静态分析方法和找到数据泄漏漏洞的工具。该方法还可以提供提示以减轻这些泄漏。我们通过分析从Google Play商店下载的一组Android自动应用程序来评估我们的方法,并报告了有关这些应用程序上确定的漏洞的验证结果。

The advancements in the digitization world has revolutionized the automotive industry. Today's modern cars are equipped with internet, computers that can provide autonomous driving functionalities as well as infotainment systems that can run mobile operating systems, like Android Auto and Apple CarPlay. Android Automotive is Google's android operating system tailored to run natively on vehicle's infotainment systems, it allows third party apps to be installed and run on vehicle's infotainment systems. Such apps may raise security concerns related to user's safety, security and privacy. This paper investigates security concerns of in-vehicle apps, specifically, those related to inter component communication (ICC) among these apps. ICC allows apps to share information via inter or intra apps components through a messaging object called intent. In case of insecure communication, Intent can be hijacked or spoofed by malicious apps and user's sensitive information can be leaked to hacker's database. We investigate the attack surface and vulnerabilities in these apps and provide a static analysis approach and a tool to find data leakage vulnerabilities. The approach can also provide hints to mitigate these leaks. We evaluate our approach by analyzing a set of Android Auto apps downloaded from Google Play store, and we report our validated results on vulnerabilities identified on those apps.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源