The search functionality is under construction.

IEICE TRANSACTIONS on Information

Access Control to Prevent Malicious JavaScript Code Exploiting Vulnerabilities of WebView in Android OS

Jing YU, Toshihiro YAMAUCHI

  • Full Text Views

    0

  • Cite this

Summary :

Android applications that using WebView can load and display web pages. Interaction with web pages allows JavaScript code within the web pages to access resources on the Android device by using the Java object, which is registered into WebView. If this WebView feature were exploited by an attacker, JavaScript code could be used to launch attacks, such as stealing from or tampering personal information in the device. To address these threats, we propose an access control on the security-sensitive APIs at the Java object level. The proposed access control uses static analysis to identify these security-sensitive APIs, detects threats at runtime, and notifies the user if threats are detected, thereby preventing attacks from web pages.

Publication
IEICE TRANSACTIONS on Information Vol.E98-D No.4 pp.807-811
Publication Date
2015/04/01
Publicized
2014/12/04
Online ISSN
1745-1361
DOI
10.1587/transinf.2014ICL0001
Type of Manuscript
Special Section LETTER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category
Access Control

Authors

Jing YU
  Okayama University
Toshihiro YAMAUCHI
  Okayama University

Keyword