,Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes

来源 :网络空间安全科学与技术(英文版) | 被引量 : 0次 | 上传用户:fly8468
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Third-party IME (Input Method Editor) apps are often the preference means of interaction for Android users’ input.In this paper,we first discuss the insecurity of IME apps,including the Potentially Harmful Apps (PHAs) and malicious IME apps,which may leak users’ sensitive keystrokes.The current defense system,such as I-BOX,is vulnerable to the prefix substitution attack and the colluding attack due to the post-IME nature.We provide a deeper understanding that all the designs with the post-IME nature are subject to the prefix-substitution and colluding attacks.To remedy the above post-IME system’s flaws,we propose a new idea,pre-IME,which guarantees that Is this touch event a sensitive keystroke? analysis will always access user touch events prior to the execution of any IME app code.We design an innovative TrustZone-based framework named IM-Visor which has the pre-IME nature.Specifically,IM-Visor creates the isolation environment named STIE as soon as a user intends to type on a soft keyboard,then the STIE intercepts,Android event sub translates and analyzes the user’s touch input.If the input is sensitive,the translation of keystrokes will be delivered to user apps through a trusted path.Otherwise,IM-Visor replays non-sensitive keystroke touch events for IME apps or replays non-keystroke touch events for other apps.A prototype of IM-Visor has been implemented and tested with several most popular IMEs.The experimental results show that IM-Visor has small runtime overheads.
其他文献
The National Institute of Standards and Technology (NIST) has identified natural language policies as the preferred expression of policy and implicitly called f
The popularity of social networking sites has attracted billions of users to engage and share their information on these networks.The vast amount of circulating
学科建设是高等院校建设的核心,也是提高研究生培养质量的关键.从加强学科建设的角度,以点带面,阐述了提高研究生培养质量的方法和措施.通过凝练学科方向,提高导师队伍素质,
针对海上战略威胁问题,采用模糊数学中的多对象多层次综合评判方法,建立了国家海上战略威胁定量分析模型.该模型对评估国家的安全环境和制定国家战略具有一定的指导意义.
Software obfuscation has been developed for over 30 years.A problem always confusing the communities is what security strength the technique can achieve.Nowaday
证券投资基金作为金融市场上的重要机构投资者,对稳定证券市场、拓宽投融资渠道、调节资金流向有积极的作用。对于广大投资者来说更是实现专家理财的重要工具。随着基金业在全
学位
Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of
Reinforcement leaing is a core technology for mode artificial intelligence,and it has become a workhorse for Al applications ranging from Atrai Game to Connecte
As the only approved Identity-Based Encryption scheme in China that is also standardized by ISO,SMg-IBE has been widely adopted in many real-world applications.
复杂对抗条件下的鱼雷作战能力评估分析是现代鱼雷研制、改进和使用中不可缺少的环节之一.文章从理论分析和工程应用出发,提出了一种新的鱼雷作战能力评估模型,该模型在鱼雷