On the (In)Security of Non-resettable Device Identifiers in Custom Android Systems
This program is tentative and subject to change.
User tracking is critical in the mobile ecosystem and relies on device identifiers to build user profiles. Early versions of Android allowed third-party apps to easily access non-resettable identifiers such as serial numbers and IMEI. As privacy concerns grew, Google has tightened identifier access in native Android. In response, stakeholders in custom Android systems introduced covert channels (e.g., system properties and settings) to maintain consistent and stable identifier access across systems and devices, which undoubtedly increases privacy risks. This paper examines the introduction of such channels through system customization and their vulnerability due to poor access control. We present IDRADAR, a scalable and accurate approach for identifying vulnerable properties and settings in custom Android systems. Applying our approach to 1,814 custom ROMs, we identified 8,192 system properties and 3,620 settings that store non-resettable device identifiers. Among these, 3,477 properties and 1,336 settings lack adequate access control and could be exploited by third-party apps to track users without permissions. Further validation on real devices demonstrates the effectiveness of our approach. Compared to state-of-the-art, IDRADAR offers improved scalability and analytical capabilities. Additionally, we investigate the root causes of the access control deficiencies and observe that such vulnerabilities frequently recur across devices from the same OEMs. We have reported our findings to the respective vendors and received positive confirmations. Our work underscores the need for greater scrutiny of covert access to device identifiers and better solutions to safeguard user privacy during system customizations.
This program is tentative and subject to change.
Wed 19 NovDisplayed time zone: Seoul change
11:00 - 12:30 | |||
11:00 10mTalk | Resolving Conditional Implicit Calls to Improve Static and Dynamic Analysis in Android Apps Journal-First Track Jordan Samhi University of Luxembourg, Luxembourg, René Just University of Washington, Michael D. Ernst University of Washington, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg | ||
11:10 10mTalk | GlassWing: A Tailored Static Analysis Approach for Flutter Android Apps Research Papers Xiangyu Zhang DISSec, NDST, College of Cyber Science, Nankai University, China, Yucheng Su Intelligence and Offensive Defense Lab, Xiaohongshu Inc., China, Lingling Fan Nankai University, Miaoying Cai DISSec, NDST, College of Cyber Science, Nankai University, China, Sen Chen Nankai University | ||
11:20 10mTalk | Characterizing and Repairing Color-Related Accessibility Issues in Android Apps Research Papers | ||
11:30 10mTalk | Generating Failure-Based Oracles to Support Testing of Reported Bugs in Android Apps Research Papers Jack Johnson University of Minnesota, Junayed Mahmud University of Central Florida, Oscar Chaparro William & Mary, Kevin Moran University of Central Florida, Mattia Fazzini University of Minnesota | ||
11:40 10mTalk | On the (In)Security of Non-resettable Device Identifiers in Custom Android Systems Research Papers Zikan Dong Beijing University of Posts and Telecommunications, Liu Wang Beijing University of Posts and Telecommunications, Guoai Xu Harbin Institute of Technology, Shenzhen, Haoyu Wang Huazhong University of Science and Technology | ||
11:50 10mTalk | Don't Mess with Bro's Cheese! An Empirical Study of Resource Conflict in Android Multi-window Research Papers Chenkai Guo Nankai University, China, Huimin Zhao College of Cryptology and Cyber Science, Nankai University, Tianhong Wang College of Computer Science, Nankai University, Naipeng Dong The University of Queensland, Australia, Qingqing Dong College of Cryptology and Cyber Science, Nankai University, Jiarui Che College of Computer Science, Nankai University, Yaqiong Qiao College of Cryptology and Cyber Science, Nankai University, Xiangyang Luo State Key Laboratory of Mathematical Engineering and Advanced Computing, Zheli Liu Nankai University | ||
12:00 10mTalk | Profile Coverage: Using Android Compilation Profiles to Evaluate Dynamic Testing Research Papers Pre-print | ||
12:10 10mTalk | NATE: A Network-Aware Testing Enhancer for Network-Related Fault Detection in Android Apps Research Papers Yuanhong Lan Nanjing University, Shaoheng Cao Nanjing University, Yifei Lu State Key Laboratory for Novel Software Technology, Nanjing University, China, Minxue Pan Nanjing University, Xuandong Li Nanjing University | ||
12:20 10mTalk | Automated Detection of Web Application Navigation Barriers for Screen Reader Users Research Papers Shubhi Jain University of California, Irvine, Syed Fatiul Huq University of California, Irvine, Ziyao He University of California, Irvine, Sam Malek University of California at Irvine | ||