The search functionality is under construction.

IEICE TRANSACTIONS on Information

Hiding Data in the Padding Area of Android Applications without Re-Packaging

Geochang JEON, Jeong Hyun YI, Haehyun CHO

  • Full Text Views

    0

  • Cite this

Summary :

Anonymous attackers have been targeting the Android ecosystem for performing severe malicious activities. Despite the complement of various vulnerabilities by security researchers, new vulnerabilities are continuously emerging. In this paper, we introduce a new type of vulnerability that can be exploited to hide data in an application file, bypassing the Android's signing policy. Specifically, we exploit padding areas that can be created by using the alignment option when applications are packaged. We present a proof-of-concept implementation for exploiting the vulnerability. Finally, we demonstrate the effectiveness of VeileDroid by using a synthetic application that hides data in the padding area and updates the data without re-signing and updating the application on an Android device.

Publication
IEICE TRANSACTIONS on Information Vol.E105-D No.11 pp.1928-1929
Publication Date
2022/11/01
Publicized
2022/06/13
Online ISSN
1745-1361
DOI
10.1587/transinf.2022NGL0003
Type of Manuscript
Special Section LETTER (Special Section on Next-generation Security Applications and Practice)
Category

Authors

Geochang JEON
  Soongsil University
Jeong Hyun YI
  Soongsil University
Haehyun CHO
  Soongsil University

Keyword