New tool detects unsafe security practices in Android apps

November 09, 2020

New York, NY--November 9, 2020--Computer scientists at Columbia Engineering have shown for the first time that it is possible to analyze how thousands of Android apps use cryptography without needing to have the apps' actual codes. The team's new tool, CRYLOGGER, can tell when an Android app uses cryptography incorrectly--it detects the so-called "cryptographic misuses" in Android apps. When given a list of rules that should be followed for secure cryptography--guidelines developed by expert cryptographers and organizations such as NIST and IETF that define security standards to protect sensitive data--CRYLOGGER detects violations of these rules.

Android apps use cryptographic algorithms to secure users' data, such as credit card numbers, passwords, social security numbers, etc. If used correctly, cryptography protects sensitive data by making them unintelligible. Each cryptographic algorithm is appropriate for a specific scenario and requires the configuration of specific parameters. App and library developers, however, can misuse the application programming interfaces (API) of such algorithms by using constant keys, weak passwords, or by misconfiguring other specific parameters.

"Choosing the correct algorithm and configuring its parameters are critical to keep users' data secure, but it requires an understanding of cryptography," says the study's lead author Luca Piccolboni, a PhD student who is advised by Luca Carloni, professor of computer science. "Wrong choices of the algorithms and/or misconfigurations of their parameters can result in data breaches."

CRYLOGGER is the first tool that detects cryptographic misuses by running the app instead of analyzing its code. This new approach is described in a paper that will be presented May 23-27 at IEEE Symposium on Security and Privacy 2021. In addition to Piccolboni and Carloni, the paper is authored by Giuseppe Di Guglielmo, associate research scientist in the computer science department, and Simha Sethumadhavan, associate professor of computer science and an expert in cybersecurity.

CRYLOGGER, which is open source, has several key advantages:The researchers ran 1,780 popular Android apps downloaded from the official Google Play Store--the largest case study on cryptographic misuses not based on code analysis--and discovered that almost all the apps contained code or used libraries that did not strictly adhere to security standards. Many of them used broken algorithms and others adopted unsafe cryptographic practices to protect users' data.

Each violation does not necessarily mean that an attack is possible. The rule violations should be treated as warnings to be further investigated. Some violations can be false alarms because it is very hard to precisely discriminate in all situations. The researchers contacted more than 300 developers for confirmation, but only 10 provided useful feedback.

"Many developers do not consider attacks such as privilege escalation and side-channel attacks to be possible on phones, and so they store data locally without sufficient safeguards," notes Sethumadhavan.

The team also manually analyzed the code of 28 Android apps and found that some of the violations reported by CRYLOGGER could potentially be exploited. They see two significant applications of CRYLOGGER. Developers can use it to find cryptographic misuses in their apps as well as in the third-party libraries they use. App stores, such as the Google Play Store, can use CRYLOGGER to screen submitted apps to ensure they meet security standards and are safe for final users to download. Google already uses similar screening technologies to get rid of unsafe or scam apps and these could be extended to consider cryptographic misuses.

The researchers are working on improving the accuracy of CRYLOGGER by defining techniques that will further reduce the number of false alarms. They are also using CRYLOGGER to perform inter-app analysis so that it can analyze how apps exchange data and determine if sensitive data are kept secure. In addition, they are putting rule checking for cryptographic misuses into hardware, rather than software, to force applications to use safe practices in critical contexts.

"While we keep working to improve the accuracy of CRYLOGGER, our approach can be used by app stores to promote better security practices," Carloni adds. "And we believe that CRYLOGGER's technique of analyzing thousands of Android applications by running them and collecting information that can be later analyzed offline could also be used in other security domains."
-end-
About the Study

The study is titled "CRYLOGGER: Detecting Crypto Misuses Dynamically."

Authors are: Luca Piccolboni, Giuseppe Di Guglielmo, Luca P. Carloni, and Simha Sethumadhavan, Department of Computer Science, Columbia Engineering.

This work was supported in part by the National Science Foundation (A#: 1527821 and 1764000), a gift from Bloomberg, DARPA HR0011-18-C-0017 (System Security Integrated Through Hardware and firmware), and N00014-17-1-2010.

The authors declare no financial or other conflicts of interest.

LINKS:

Paper: https://www.computer.org/csdl/proceedings-article/sp/2021/893400a160/1mbmHwIxTb2

DOI: 10.1109/SP40001.2021.00010

CRYLOGGER code: https://github.com/lucapiccolboni/crylogger

VIDEO #1: https://www.youtube.com/watch?v=p_OpxodV-gk

VIDEO #2: https://www.youtube.com/watch?v=ZLYedVDmTRA

http://engineering.columbia.edu/
https://www.engineering.columbia.edu/faculty/luca-carloni
https://www.cs.columbia.edu/
https://datascience.columbia.edu/

Columbia Engineering

Columbia Engineering, based in New York City, is one of the top engineering schools in the U.S. and one of the oldest in the nation. Also known as The Fu Foundation School of Engineering and Applied Science, the School expands knowledge and advances technology through the pioneering research of its more than 220 faculty, while educating undergraduate and graduate students in a collaborative environment to become leaders informed by a firm foundation in engineering. The School's faculty are at the center of the University's cross-disciplinary research, contributing to the Data Science Institute, Earth Institute, Zuckerman Mind Brain Behavior Institute, Precision Medicine Initiative, and the Columbia Nano Initiative. Guided by its strategic vision, "Columbia Engineering for Humanity," the School aims to translate ideas into innovations that foster a sustainable, healthy, secure, connected, and creative humanity.

Columbia University School of Engineering and Applied Science

Related Cryptography Articles from Brightsurf:

New tool detects unsafe security practices in Android apps
Computer scientists at Columbia Engineering have shown for the first time that it is possible to analyze how thousands of Android apps use cryptography without needing to have the apps' actual codes.

A question of reality
Physicist Reinhold Bertlmann of the University of Vienna, Austria has published a review of the work of his late long-term collaborator John Stewart Bell of CERN, Geneva in EPJ H.

Randomness theory could hold key to internet security
In a new paper, Cornell Tech researchers identified a problem that holds the key to whether all encryption can be broken -- as well as a surprising connection to a mathematical concept that aims to define and measure randomness.

Future quantum computers may pose threat to today's most-secure communications
Quantum computers that are exponentially faster than any of our current classical computers and are capable of code-breaking applications could be available in 12 to 15 years, posing major risks to the security of current communications systems, according to a new RAND Corporation report.

Automated cryptocode generator is helping secure the web
In a paper presented at the recent IEEE Symposium on Security and Privacy, MIT researchers detail a system that, for the first time, automatically generates optimized cryptography code that's usually written by hand.

Is quantum computing scalable?
Debbie Leung, a fellow in CIFAR's Quantum Information Science program and a faculty member at the University of Waterloo's Institute for Quantum Computing, will discuss the challenges of scaling quantum computing at the AAAS meeting on Feb.

Quantifying how much quantum information can be eavesdropped
Summary The most basic type of quantum information processing is quantum entanglement.

Communication interception can be traced through meteor trails
Meteor burst communication is based on using meteors as cryptography assistants.

Slicing optical beams: Cryptographic algorithms for quantum networks
The mathematical models can be used not only for quantum networks and authentication but also for full-scale quantum computing.

Ytterbium: The quantum memory of tomorrow
Quantum communication and are the future of high-security communication. One of the major challenges is to create memories with the capacity to store quantum information carried by light.

Read More: Cryptography News and Cryptography Current Events
Brightsurf.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.