Security Analyses of Android APPs on Ad Libs and Linked URLs

Page created by Jaime Wagner
 
CONTINUE READING
Security Analyses of Android APPs on Ad Libs and Linked URLs
International Journal of Network Security, Vol.23, No.2, PP.246-254, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).07)     246

  Security Analyses of Android APPs on Ad Libs
                and Linked URLs
      Ming-Yang Su, Sheng-Sheng Chen, Tsung-Ren Wu, Hao-Sen Chang, and You-Liang Liu
                                          (Corresponding author: Ming-Yang Su)

              Department of Computer Science and Information Engineering, Ming Chuan University
                                5 De Ming Rd., Gui Shan District, Taoyuan, Taiwan
                                        (Email: minysu@mail.mcu.edu.tw)
             (Received Aug. 9, 2020; Revised and Accepted Nov. 10, 2020; First Online Feb. 15, 2021)

Abstract                                                       and recognized 113,640,221 unique URLs as malicious in
                                                               Q1 2019. In addition, the number of advertising apps
Security threats posed by free apps with advertising have (adware) doubled compared to Q4 2018. In recent years,
become a significant concern recently. An app developer many noticeable security incidents have been related to
must put at least one Software Development Kit (SDK), ad libs and their connected URLs.
called ad library (ad lib), into his or her host program and
                                                                   A malware named RottenSys, disguised as an app of
compile the host program and ad-lib(s) into an executable
                                                               System Wi-Fi service, appeared in 2018 and was esti-
Android Package (APK) file. Therefore, the ad-lib(s) be-
                                                               mated to have infected 5 million brand new smartphones
come part of the APK and have all permissions granted
                                                               through a supply chain attack [13]. In addition to display-
to the app. This study proposes a method of evaluat-
                                                               ing uninvited ads, CheckPoint researchers found that Rot-
ing apps’ security focusing on two types of threats: (1)
                                                               tenSys was designed to download and install some compo-
permission misuse of ad-libs in an app and (2) the risk
                                                               nents from its C&C server, which means the attackers can
of linked URLs when an app is executing. For the first
                                                               easily fully control the infected devices. Another family of
concern, this study observes the SecurityException and
                                                               malware, called Tekya, was disclosed in 2020 and gener-
checkPermission mechanisms used by ad-libs to attempt
                                                               ated fake clicks on ads and banners delivered by some well-
permission misuse. For the second concern, this study
                                                               known ad libs, like Google’s AdMob [10]. According to
conducts both static and dynamic analyses to identify all
                                                               the report, more than 56 apps with malware were down-
possible linked URLs of an app and evaluates their risks
                                                               load and installed on almost 1.7 million devices before
through third-party utilities. The two issues addressed in
                                                               CheckPoint found out about them. Kaspersky Lab iden-
this paper are beyond the reach of traditional anti-virus
                                                               tified an Android malware called Loapi [11]. Users’ mo-
software, which normally inspects the codes and is nor-
                                                               bile phones would be infected if they accidentally clicked
mally unable to determine threats posed by embedded
                                                               on a banner ad while browsing websites, which triggered
ad-lib(s) and linked URLs, because embedded ad-lib(s)
                                                               the download of a counterfeit anti-virus app or adult app.
may steal personal information using the host app’s per-
                                                               Loapi asks the user for administrator privileges, and if
missions, and the danger of linked URLs does not lie in
                                                               the request is declined, the prompt continues to display
the app itself. The proposed system thus complements
                                                               on the screen until the user gets fed up and clicks the
traditional anti-virus software to ensure free-app users’
                                                               confirm button. Once the privileges are obtained, due to
security and privacy.
                                                               its modular design, Loapi can download and install new
Keywords: Ad Lib; CheckPermission; Permission Misuse; components via remote server commands.
URL (Uniform Resource Locator); SecurityException
                                                                   From the above-mentioned incidents, this study there-
                                                               fore addresses the threats of permission misuse of ad libs
1 Introduction                                                 and linked URLs by an app. In order to gain ad revenues,
                                                               the developer includes one or more ad libs in the host
An ad library (ad lib) is a Software Development Kit program and compiles them into an executable APK file,
(SDK) that allows app developers to get advertisement which means that all of the app’s declared permissions
income from their apps. However, ad libs also pose po- are now shared by the ad libs. For example, if an ad lib
tential security risks that traditional anti-virus software is claims to use only permissions p1 and p2 in the document
not designed to detect. Moreover, linked URLs may pose of its official website, and the host app claims to use per-
a security threat when an app is executed. Kaspersky missions p3, p4 and p5, then once combined and compiled
Lab [7] detected 905,174 malicious installation packages into an app, the ad lib can use all the permissions from p1
Security Analyses of Android APPs on Ad Libs and Linked URLs
International Journal of Network Security, Vol.23, No.2, PP.246-254, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).07)   247

to p5. Permission misuse occurs if the ad lib attempts to  has forced free app developers to turn to less well-known
use permissions p3, p4, and p5. App developers usually     ad networks and to include more ad libs in their apps in
include multiple ad libs in their apps to increase ad rev- order to raise their advertising revenue. Stevens et al. [20]
enue, which compounds the security risk. Gao et al. [9]    evaluated 13 ad libs from different ad networks and found
designed a system called PmDroid, which uses graphical     several security issues, like using permissions irrelevant to
interfaces to show the severity of permission misuse of ad advertising to send SMSs, read Calendars, or make phone
libs in an app. They found that a large amount of personal calls. In addition, seven of the thirteen ad libs analyzed
information is sent to sites like personal clouds instead of
                                                           in this study contained JavaScript interface, meaning that
advertising servers. In their experiment, which observed   those modules could execute external JavaScript.
the use of the READ-PHONE-STATE permission, mobile            Diamantaris et al. [8] mentioned that users do not have
phone status information was sent to advertising servers   enough knowledge to distinguish whether a permission
89 times, to some cloud servers 29 times, and to unidenti- request is from the host app or possibly dangerous ad
fied servers 68 times. Wei et al. [24] noted that even somelibs. The authors examined over 5,000 popular apps and
apps that are identified by anti-virus software as normal  found 65% of permission requests are not from the host
are likely to link to malicious websites during their oper-apps, but from ad libs. A system named Reaper was pro-
ations. The authors combined a static method (decom-       posed to trace and tell if permission requests are issued
piling and checking program code) with a dynamic one       by the functionality of host apps or the embedded ad libs.
(operating an app for two hours in an emulator and ob-     Lee and Ryu [14] suggested that although app develop-
serving its behavior). They collected 13,500 normal apps,  ers are informed about permissions required by the ad
and 1,260 known malicious apps and found they linked to    libs, they may not be aware of the rich functionalities of
254,022 and 19,510 URLs during operations, respectively.   the permissions declared for the ad libs, which mean they
According to the inspection of Web-Of-Trust (WOT) [25]     pose serious security threats. Lee and Ryu showed some
and VirusTotal [23], in the experiment for normal apps,    ad libs can exploit powerful APIs to conduct well-known
8.8% of apps linked to malicious sites, 15% linked to bad  malicious behaviors. An open-source tool, ADLIB, was
websites, 73% linked to low-reputation websites, and a     presented to detect APIs that are accessible from any ad-
total of 74% linked to sites unsuitable for children. In-  vertisements.
terestingly, although the results of the experiment with      Athanasopoulos et al. [5] suggested that more than half
known malicious apps were expected to be worse, it was     of the apps on Google Play contain ad libs that link to
found that the distribution of linked URLs was similar to  third-party advertisers, leading to possible privacy leak-
that of normal apps.                                       age. Therefore, the NaClDroid architecture was proposed
   This study therefore addresses two types of security    in order to separate the code of ad libs from that of the
issues about apps: (1) permission misuse of ad libs in     host app without sharing permissions. Zhu et al. [28] de-
an app, and (2) the security threat posed by app-linked    veloped a system called AdCapsule, which included two
URLs. For the first issue, this study adopts SecurityEx-   functions: a permission sandbox and a file sandbox. This
ception and/or checkPermission mechanisms to analyze       system aimed to constrain the permission and file use of
permission misused by ad libs and builds a blacklist as    ad libs to within a permissible range. AdCapsule did not
a reference for the proposed system. For the second is-    need to change the framework of the Android system or
sue, this study applies static analysis through decompiled to root the mobile phone, and the cost of running AdCap-
APKs and dynamic analysis using an emulator to find        sule was very low. He et al. [12] explored how to select ad
all linked URLs. The linked URLs are then assessed by      networks from the perspective of app developers to maxi-
impartial third-party utilities, WOT [25] and VirusTo-     mize their advertising profits and recommended including
tal [23], in a real-time manner. The two problems ad-      no more than six ad libs in an app.
dressed in this paper are beyond the reach of traditional     Ruiz et al. [17] discussed the problems caused by ad-lib
anti-virus software, because ad libs use permissions de-   updating. According to their experiment, more than 90%
clared by the host app to steal private information, and   of apps are free, and so the only income for these app
any linked URLs are not part of the app itself.            developers is advertising, thereby making it important to
   The remainder of this paper is organized as follows.    ensure that the ad libs generate expected profits. Any
Section 2 reviews the related literature. Section 3 de-    ad lib that fails to obtain expected profits should be re-
scribes the research method applied. Section 4 presents    placed or supplemented with other ad libs. They collected
the experiment results obtained. Section 5 offers conclu-  13,983 versions of 5,937 apps and found that nearly 50%
sions.                                                     of those apps had changed their ad libs within 12 months
                                                           in the form of addition, removal, or update. Su et al. [22]
                                                           used HTTP data mining through network traffic, based
2 Literature Review                                        on three aspects: quantitative, timing and semantic. The
                                                           authors claimed an accuracy rate of 95% for the traffic
According to Ruiz et al. [16], the recent notable increase of malicious ad libs. Shuba and Markopoulou [19] pro-
of free apps has caused the top 40 ad networks to respond posed a system called AntWall to prevent ad libs from
to less than 18% of ad requests from applications. This leaking users’ personal information. AntWall can be exe-
Security Analyses of Android APPs on Ad Libs and Linked URLs
International Journal of Network Security, Vol.23, No.2, PP.246-254, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).07)    248

cuted in the background without rooting the mobile phone      way is to use ContextWrapper.checkPermission() in the
and utilizes low energy consumption and network traffic.      android.content package name to confirm whether there
However, AntWall relies on the manual input of the name       is a specific permission declaration.
of an ad network to operate effectively. Yan et al. [27]         This study uses the Android emulator to analyze per-
designed a new Android model called RTDroid that ba-          mission misuses of ad libs. This method inserts an ad
sically modifies some internal Android components to re-      lib into an empty project, MyAPP, which does not de-
place the original Android Dalvik virtual machine (VM)        clare any other permission than those required by the ad
with a real-time VM, ensuring that the execution of any       lib. After execution, the Android SDK is monitored, and
app and its ad libs are more predictable.                     the permissions requested by the ad lib from the Android
   Liu et al. [15] discussed analytics libraries, which are   system is the output. If the ad lib only declares permis-
used to trace ad presence and clicks and are more likely      sion A and permission B, but permission C is requested,
to leak users’ personal information than ad libs. The         then permission C is determined to be a misuse. The
authors implemented a framework called Alde to check          proposed method then adds permission C to the Android-
if users’ in-app actions were collected through analytics     Manifest.XML for declaration and continues to find other
libraries. According to their experiments involving 300       misuses until no new ones can be found. The algorithm
apps, some apps did indeed leak users’ privacy to analytics   is given formally as follows.
libraries without notifying users. Shao et al. [18] focused      Algorithm: Determine permission misused by an ad
on whether the websites linked in the ad libs threatened      lib.
the security of mobile phones. They designed a static
analysis tool that is able to find the embedded ad libs        1) Create an empty project using Android Studio with-
in an app and a dynamic analysis tool with three func-            out any declaration of permissions. Insert a test ad
tions: identifying linking websites, detecting malware and        lib into the project and add all permissions needed
fraud, and determining the source of an attack. Their ex-         by the ad lib to the AndroidManifest.XML.
periment analyzed 242 ad libs from 600,000 apps, which         2) Set breakpoints for monitoring SecurityException()
were linked to a total of 1.5 million URLs. Some at-              and ContextWrapper.checkPermission().
tacks originated through website connection, including
malicious anti-virus software fraud, free iPad fraud, and      3) Execute the project in debug mode and trigger ad
Trojan horse attacks that used messages to distribute ad-         events to make sure the code of the ad lib can be
vertisements. Su et al. [21] noted that most ad libs have         executed.
communication patterns when communicating with their
ad servers. The pattern, although probably not unique,         4) Scan the monitored messages and retrieve attempts
can help identify or group ad libs contained in an app.           to access permissions.

                                                               5) Compare the permission access attempts obtained
                                                                  from Step 4 with the permissions declared in the
3     Research Method                                             AndroidManifest.XML to obtain permission misuses.
The proposed system herein has two functions: (1) anal-           If any new one exists, then add the declaration of
ysis of permission misused by ad libs, and (2) risk assess-       the misused permission to the AndroidManifest.XML
ment of URLs linked with apps. The proposed system is             and go to Step 3; otherwise, no more permission mis-
introduced as follows.                                            uses can be found, and thus terminate the procedure.

                                                                 The idea behind this algorithm is basically that the
3.1    Analysis of Permission Misused by                      misused permissions are obtained through the difference
       Ad Libs                                                between the attempts to access permissions and the ad-
                                                              vertiser’s declaration. In order to find all permission mis-
Android’s safety mechanism is to allow the use of its func-   uses, the first found one should be added to AndroidMan-
tionalities by declaring corresponding permissions in An-     ifest.xml, and then Step 3 starts to find the next one until
droid Manifest.xml. If a functionality is used without        no more can be found. For example, the ad lib may misuse
proper declaration, then errors cause the app’s execution     the READ CONTACTS and SEND SMS permissions in
to end. Therefore, it is necessary to add an exception        order. The proposed procedure will first find the attempt
mechanism to the code of ad libs that attempt permission      to access READ CONTACTS. After adding the permis-
misuses, given that ad libs do not know which permissions     sion to the AndroidManifest.xml, the process returns to
are declared by the host app. In order to avoid execution     Step 3, and it will be able to find the attempt to access
errors, there are two ways for ad libs to deal with per-      the SEND SMS permission. All permission misuses can
mission misuse. The first way is to use SecurityException     be found in this way. Applying the method to investigate
in the java.lang package name to catch exceptions; i.e.,      different ad libs, a list of ad libs with declared and un-
the ad lib’s code is wrapped with try-catch. When errors      declared permission accesses can be obtained. The list is
occur to an undeclared permission access, a new Securi-       used in the proposed system to determine if a test APK
tyException() occurs for exception handling. The second       contained ad libs committing permission misuse.
Security Analyses of Android APPs on Ad Libs and Linked URLs
International Journal of Network Security, Vol.23, No.2, PP.246-254, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).07)        249

                    (a)                                    (b)                                       (c)

Figure 1: Obtaining URLs statically and dynamically. (a) Part of the decompiled program codes, (b) Part of the
decompiled program codes when searching URLs from .smali after decompilation, (c) Part of the code to get URLs
in real time.

3.2    Risk Assessment of URLs Linked 4                                Experiment Results
       with the App
                                                                 The whole process of this study appears in Figure 3. The
                                                                 user selects a test APK on the smartphone and checks
                                                                 either one or both functions described in Section 3. The
This function consists of four phases. The first phase           APK is then sent to the proposed server. After the anal-
reads URLs statically after decompiling the APK. The             yses, the results are returned to the user. In the server,
second phase gathers linked URLs in the emulator. The            the APK file is decompiled in order to analyze permis-
third phase merges all URLs and sends them to Web-               sion misuse and/or linked URL risk. The former searches
Of-Trust (WOT) [25] and VirusTotal [23] for inspection.          Package Name to identify the ad libs embedded in the
The fourth phase receives responses from the two websites        APK and then compares the results with the list of ad
and provides security information about the test APK to          lib with permission misuses obtained in Section 3.1. The
users.                                                           latter includes a static search for URLs and a dynamic
                                                                 search for URLs from the traffic in the emulator. All col-
    In the first phase, the user selects an APK and sends        lected URLs are sent to WOT [25] and VirusTotal [23]
it to the proposed server for static analysis. In the server     for risk analysis. Finally, the server integrates the results
end, the uploaded APK is decompiled and parsed to get            and sends them back to the user, as shown in Figure 3.
all URLs. Figure 1(a) shows the codes to decompile an
APK using Apktool [3], in which decoderSetting(true,             4.1    Results of Permission Misuse Analy-
true) means to decompile source code and resources. Fig-
ure 1(b) is the code to parse the .smali files after decompi-
                                                                        sis
lation in order to get URLs statically. In the second stage,     This study tests 26 ad libs on the AppBrain website [4],
the test APK is run in an emulator in order to record all        presenting the results in Table 1. According to the list
the URLs with which it is linked. This study applies NOX         of ad libs obtained by the algorithm in Section 3.1, the
emulator [6] and Monkeyrunner [1] to simulate user clicks.       declared permissions by the ad libs are marked as “O”,
The URLs are then captured using Pcap4j [26]. Figure             and the undeclared but requested permissions in run time
1(c) is the code to get URLs in real time.                       are marked as “X”. Most of the ad libs have undeclared
                                                                 but requested permissions MODIFY AUDIO SETTINGS
   The third stage collects all obtained URLs, removes           and BLUETOOTH. Ad libs P and R in Table 1 at-
duplicates, and sends them to WOT [25] and VirusTo-              tempted by requesting ACCESS FINE LOCATION/ AC-
tal [23], two trusted third-party security websites, for risk    CESS COARSE LOCATION and READ CONTACTS,
assessments. The json files sent back from the two web-          respectively. In addition, ad libs A and U appear to have
sites are then parsed, sorted, and presented to the mobile       requested excessively dangerous permissions, although
phone user. This study uses the WOT Public API to                they did not commit permission misuse. The permissions
send HTTP GET REQUEST, as shown in Figure 2(a),                  in red in Table 1 are dangerous, according to the official
and determines a score for the test APK based on the re-         Android website [2].
turned results. Similarly, this study sends HTTP POST               Figure 4 shows an example. After choosing an APK
REQUEST via the VirusTotal Academic API, as shown                and sending it to the server, the results returned to the
in Figure 2(b), and determines a score for the test APK          smartphone are shown in Figure 4(a). Here, the APK
based on the returned results.                                   contains 9 ad libs, and all of the attempts to access per-
Security Analyses of Android APPs on Ad Libs and Linked URLs
International Journal of Network Security, Vol.23, No.2, PP.246-254, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).07)   250

                             (a)                                                  (b)

Figure 2: Program segments of communication between the proposed system and WOT and VirusTotal as well. (a)
Program segment of WOT API call, (b) Program segment of VirusTotal API call.

                  Figure 3: Flowchart of an APK analysis: Permission misuse and linked URL risk

                                   (a)                    (b)                       (c)

Figure 4: Example: An APK with nine ad libs and their permission access attempts. (a) All ad libs and declared
permissions, (b) Permission misuses in red, (c) Permission access of an ad lib.
Security Analyses of Android APPs on Ad Libs and Linked URLs
International Journal of Network Security, Vol.23, No.2, PP.246-254, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).07)   251

                                   Table 1: List of ad libs with permission misuses

mission are shown. Some permission misuses are shown         the screens from either VirusTotal or WOT, in the middle
in Figure 4(b) in red. Clicking the Detail button shows      of the figures, shows detailed information from the third-
all permission access attempts from every ad lib, as seen    party risk analyses, as shown in Figure 6(c) and Figure
in Figure 4(c). Permissions in yellow in Figure 4 are con-   6(d) for VirusTotal and WOT, respectively.
sidered dangerous according to the official Android web-        From the first row of Figures 6(c) and 6(d),
site [2].                                                    it is obvious that VirusTotal focused on check-
                                                             ing malware/phishing/malicious/suspicious URLs, while
                                                             WOT focused on evaluating URLs’ trust/child-safety
4.2    Results of Linked URL Risk Assess-                    scores. In Figure 6(c), almost all URLs are clean,
       ment                                                  as each of them gets 1.0 (i.e., a score of 100),
                                                             with the exception of the URL in the second row
This process includes static and dynamic analyses. The       (https://api.appsflyer.com/install data/v3/), which got
static analysis decompiles the test APK and then parses      0.984375 (i.e., a score of 98.4375). Therefore, the aver-
the smali file of the classes.dex file to obtain the requested
                                                             age score is 99, as shown in Figure 6(a), with no URL
URLs by using regular expression. Dynamic analysis ana-      scoring less than 70. Although the URLs have no mal-
lyzes the linked URLs during execution in an emulator by     ware or are not phishing/malicious/suspicious, it is still
inspecting the network traffic caused by the APK. Finally,   necessary to use WOT to evaluate their trust scores (rep-
all of the URLs obtained from static and dynamic anal-       utation) and child-safety scores (whether the contents are
ysis were sent to WOT [25] and VirusTotal [23] for risk      suitable for children). In Figure 6(d), every URL’s trust
analysis. The sites each returned a string in json format,   score and child-safety score are given. While the average
as shown in Figure 5.                                        trust score and child-safety scores are 73 and 70, respec-
   The server then computes the scores from the returned     tively, as shown in Figure 6(b), those URLs with scores
json files and presents them to the mobile phone user, as    less than 70 (i.e., unsafe ones) can also be found at the
shown in Figures 6(a) and 6(b) for VirusTotal and WOT,       lower part of Figure 6(b).
respectively. URLs with a score of less than 70 are con-
sidered dangerous and are also shown in the lower parts
of Figures 6(a) and 6(b). In this example, no URL re- 5        Conclusion
ceived a score of less than 70 from WOT (see Figure
6(a)), but several URLs received scores of less than 70 This study’s findings present from the experiments con-
from VirusTotal (see Figure 6(b)). Clicking the icon on ducted that most permission misuses involve MOD-
International Journal of Network Security, Vol.23, No.2, PP.246-254, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).07)   252

                                           (a)                           (b)

                Figure 5: Json files returned from WOT and VirusTotal. (a) WOT, (b) VirusTotal .

                 (a)                        (b)                         (c)                        (d)

Figure 6: Risk assessments of linked URLs of an app from VirusTotal and WOT. (a) Summary report from VirusTotal,
(b) Summary report from WOT, (c) Detailed information from VirusTotal, (d) Detailed information from WOT.
International Journal of Network Security, Vol.23, No.2, PP.246-254, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).07)     253

IFY AUDIO SETTINGS and BLUETOOTH permis-                        [10] D. Goodin,         Google Play’s Malicious App
sions, which are fortunately not dangerous according to              Problem Infects 1.7 Million More Devices,
the official Android website. Some ad libs did not commit            Mar.      25,      2020.     (https://arstechnica.
permission misuse, but did declare excessive permissions             com/information-technology/2020/03/
beyond the needs of advertising. In addition, the linked             found-malicious-google-play-apps-with-1-7
URLs of an app were obtained through static and dy-                  -million-downloads-many-by-children/)
namic analyses. Through the evaluation of these URLs            [11] L. Grustniy, Loapi — this Trojan is hot!,
by impartial third-party websites, a quantitative security           Dec. 18, 2017. (https://www.kaspersky.com/
score is presented to mobile phone users. In other words,            blog/loapi-trojan/20510/)
the system proposed in this paper informs users clearly         [12] B. He, H. Xu, L. Jin, G. Guo, Y. Chen, and G. Weng,
whether the ad libs in an app access permissions beyond              “An investigation into android in-app ad practice:
their declarations, and of the risk of URLs linked in that           Implications for app developers,” in The IEEE Con-
app. This work helps users achieve further awareness of              ference on Computer Communications (IEEE INFO-
the security level of an app before installation, in contrast        COM’18), pp. 2465-2473, 2018.
to traditional anti-virus tools.                                [13] S. Khandelwal, Pre-Installed Malware Found On
                                                                     5 Million Popular Android Phones, The Hacker
                                                                     News, Mar. 15, 2018. (https://thehackernews.
Acknowledgments                                                      com/2018/03/android-botnet-malware.html)
                                                                [14] S. Lee and S. Ryu, “Adlib: Analyzer for mobile
This research was partially supported by the Ministry of
                                                                     ad platform libraries,” in The 28th ACM SIGSOFT
Science and Technology under grant numbers MOST 107-
                                                                     International Symposium on Software Testing and
2221-E-130-003 and 109-2221-E-130-005.
                                                                     Analysis, pp. 262-272, 2019.
                                                                [15] X. Liu, J. Liu, S. Zhu, W. Wang, and X. Zhang,
References                                                           “Privacy risk analysis and mitigation of analytics li-
                                                                     braries in the android ecosystem,” IEEE Transac-
 [1] Android,      Monkeyrunner,      Feb.  15,    2021.             tions on Mobile Computing, vol. 19, no. 5, pp. 1184-
     (https://developer.android.com/studio/test/                     1199, 2020.
     monkeyrunner)                                              [16] I. J. M. Ruiz, M. Nagappan, B. Adams, T. Berger,
 [2] Android, Manifest.permission, Feb. 15, 2021.                    S. Dienst, and A. E. Hassan, “Impact of ad libraries
     (https://developer.android.com/reference/                       on ratings of android mobile apps,” IEEE Software,
     android/Manifest.permission)                                    vol. 31, no. 6, pp. 86-92, 2014.
 [3] Apktool, A Tool for Reverse Engineering Android            [17] I. J. M. Ruiz, M. Nagappan, B. Adams, T. Berger,
     Apk Files, Feb. 15, 2021. (https://ibotpeaches.                 S. Dienst, and A. E. Hassan, “Analyzing ad library
     github.io/Apktool/)                                             updates in android apps,” IEEE Software, vol. 33,
 [4] AppBrain, Android Ad Network Statistics And Mar-                no. 2, pp. 74-80, 2016.
     ket Share, Feb. 15, 2021. (http://www.appbrain.
                                                                [18] R. Shao, V. Rastogi, Y. Chen, X. Pan, G. Guo, S.
     com/stats/libraries/ad)
                                                                     Zou, and R. Riley,“Understanding in-app ads and
 [5] E. Athanasopoulos, V. P. Kemerlis, G. Portoka-
                                                                     detecting hidden attacks through the mobile app-web
     lidis, and A. D. Keromytis,“NaClDroid: Native code
                                                                     interface“, IEEE Transactions on Mobile Computing,
     isolation for android applications,” Lecture Notes
                                                                     vol. 17, no. 11, pp. 2675-2688, 2018.
     on Computer Sciences, LNCS 9878, pp. 422-439,
                                                                [19] A. Shuba and A. Markopoulou, “Demo: AntWall-A
     Springer, 2016.
 [6] Bignox, NOX Emulator, Feb. 15, 2021. (https://                  system for mobile adblocking and privacy exposure
     tw.bignox.com/)                                                 prevention,” in The ACM International Symposium
 [7] V.      Chebyshev,    F.    Sinitsyn,   D.    Pari-             on Mobile Ad Hoc Networking and Computing (Mo-
     nov, B. Larin, O. Kupreev, E. Lopatin,                          biHoc’18), 2018.
     IT Threat Evolution Q1 2019. Statistics,                   [20] R. Stevens, C. Gibler, J. Crussell, J. Ericksonand,
     May      23,    2019.   (https://securelist.com/                and H. Chen, “Investigating user privacy in android
     it-threat-evolution-q1-2019-statistics/                         ad libraries,” in The IEEE Mobile Security Technolo-
     90916/)                                                         gies (MoST), 2012.
 [8] M. Diamantaris, E. P. Papadopoulos, and E. P.              [21] M. Y. Su, H.-S. Wei, X.-Y. Chen, P.-W. Lin, D.-Y.
     Markatos, ”REAPER: Real-time app analysis for                   Qiu, “Using ad-related network behavior to distin-
     augmenting the android permission system,” in The               guish ad libraries,” Applied Sciences, vol. 8, no. 10,
     Ninth ACM Conference on Data and Application Se-                pp. 1-18, 2018.
     curity and Privacy, pp. 37-48, 2019.                       [22] X. Su, X. Liu, J. Lin, S. He, Z. Fu, and W. Li,
 [9] X. Gao, D. Liu, H. Wang, and K. Sun, “PmDroid:                  “De-cloaking malicious activities in smartphones us-
     Permission supervision for android advertising,” in             ing HTTP flow mining,” KSII Transactions on In-
     The IEEE Symposium on Reliable Distributed Sys-                 ternet and Information Systems, vol. 11, no. 6, pp.
     tems, pp. 120-129, 2015.                                        3230-3253, 2017.
International Journal of Network Security, Vol.23, No.2, PP.246-254, Mar. 2021 (DOI: 10.6633/IJNS.202103 23(2).07)   254

[23] VirusTotal, Virustotal, Feb. 15, 2021. (https://        degrees from National Central University and National
     www.virustotal.com/)                                    Taiwan University in 1991 and 1997, respectively. He is
[24] X. Wei, I. Neamtiu, and M. Faloutsos, “Whom does        a professor of the Department of Computer Science and
     your android app talk to?,” in The IEEE Global          Information Engineering at Ming Chuan University, Tai-
     Communications Conference (GLOBECOM’15), pp.            wan. His research interests include network security, in-
     1-6, 2015.                                              trusion detection/prevention, malware detection, mobile
[25] WOT, Protect Your Browsing with Web of Trust,           security and wireless sensor networks.
     Feb. 15, 2021. (http://www.mywot.com/)
                                                             Sheng-Sheng Chen received his B.S. degree in Com-
[26] K. Yamada, Pcap4j, Feb. 15, 2021. (https://
                                                             puter Science and Information Engineering from Ming
     github.com/kaitoy/pcap4j)
                                                             Chuan University, Taiwan in 2019. His research inter-
[27] Y. Yan, S. Cosgrove, V. Anand, A. Kulkarni, S. H.
                                                             ests include mobile security and MANET.
     Konduri, S. Y. Ko, and L. Ziarek, “RTDroid: A de-
     sign for real-time android,” IEEE Transactions on       Tsung-Ren Wu received his B.S. degree in Computer
     Mobile Computing, vol. 15, no. 10, pp. 2564-2584,       Science and Information Engineering from Ming Chuan
     2016.                                                   University, Taiwan in 2019. His research interests include
[28] X. Zhu, J. Li, Y. Zhou, and J. Ma, “AdCap-              mobile security and MANET.
     sule: Practical confinement of advertisements in an-
                                                             Hao-Sen Chang received his B.S. degree in Computer
     droid applications,” IEEE Transactions on Depend-
                                                             Science and Information Engineering from Ming Chuan
     able and Secure Computing, vol. 17, no. 3, pp. 479-
                                                             University, Taiwan in 2019. His research interests include
     492, 2020.
                                                             mobile security and MANET.
                                                         You-Liang Liu received his B.S. degree in Computer
Biography                                                Science and Information Engineering from Ming Chuan
                                                         University, Taiwan in 2019. His research interests include
Ming-Yang Su received his B.S. degree in Computer
                                                         mobile security and MANET.
Science and Information Engineering from Tunghai Uni-
versity, Taiwan in 1989, and received his M.S. and Ph.D.
You can also read