FirmwareDroid: Towards Automated Static-Analysis of Pre-Installed Android Apps
Supply chain attacks are an evolving threat to the IoT and mobile landscape. Recent malware findings have shown that even sizeable mobile phone vendors cannot defend their operating systems fully against pre-installed malware. Detecting and mitigating malware and software vulnerabilities on Android firmware is a challenging task requiring expertise in Android internals, such as customized firmware formats. Moreover, as users cannot choose what software is pre-installed on their devices, there is a fundamental lack of transparency and control. To make Android firmware analysis more accessible and regain some transparency, we present FirmwareDroid, a novel open-source security framework for Android firmware analysis that automates the extraction and analysis of pre-installed software.
FirmwareDroid streamlines the process of software extraction from Android firmware for static security and privacy assessments. With FirmwareDroid, we lay the groundwork for researchers to automate the security assessment of Android firmware at scale, and we demonstrated the capabilities of FirmwareDroid by examining 5’728 Android firmware samples from various vendors. We analyzed 75’141 unique pre-installed Android applications to examine how common advertising tracker libraries (a piece of software that collects user usage data) are used and which permissions pre-installed Android apps inherit. We conclude that 20.53% of all apps in our dataset include advertising trackers and that 88.14% of all used permissions are signature-based.
Mon 15 MayDisplayed time zone: Hobart change
11:00 - 12:30 | |||
11:00 25mPaper | Analysis of Library Dependency Networks of Package Managers Used in iOS Research Track Kristiina Rahkema University of Tartu, Dietmar Pfahl University of Tartu, Rudolf Ramler Software Competence Center Hagenberg Pre-print | ||
11:25 25mPaper | FirmwareDroid: Towards Automated Static-Analysis of Pre-Installed Android Apps Research Track Thomas Sutter Zurich University of Applied Science/University of Zurich, Bernhard Tellenbach Armasuisse Cyber-Defence Campus | ||
11:50 15mPaper | Vulnerability Propagation in Package Managers Used in iOS Development Research Track Pre-print | ||
12:05 10mTalk | Q&A Research Track |