TY - JOUR
T1 - Understanding the origins of weak cryptographic algorithms used for signing android apps
AU - Yoshida, Kanae
AU - Imai, Hironori
AU - Serizawa, Nana
AU - Mori, Tatsuya
AU - Kanaoka, Akira
N1 - Publisher Copyright:
© 2019 Information Processing Society of Japan.
Copyright:
Copyright 2019 Elsevier B.V., All rights reserved.
PY - 2019
Y1 - 2019
N2 - Android applications are digitally signed using developers’ signing keys. Since each key is associated with a developer, it can be used to establish trust between applications published by the author, i.e., apps signed with the same key are allowed to update themselves if package names are identical, or access each other’s resources. However, if a signature is generated using a weak algorithm such as MD5, then apps signed with the corresponding key are exposed to several risks, such as hijacking apps with fake updates or granting permissions to a malicious app. In this work, we analyze several Android apps to identify the threats caused by using weak algorithms. Our study uncovered the following findings: Of the more than one million apps collected from Google Play, 223 and 52,866 were digitally signed using the weak algorithms of 512-bit RSA key and MD5, respectively. We identified the causal mechanisms for generating certificates that employ weak algorithms, and found that these mechanisms can be attributed to app-building frameworks and online app-building services. On the basis of these findings, we provide guidelines for stakeholders of the Android app distribution ecosystem.
AB - Android applications are digitally signed using developers’ signing keys. Since each key is associated with a developer, it can be used to establish trust between applications published by the author, i.e., apps signed with the same key are allowed to update themselves if package names are identical, or access each other’s resources. However, if a signature is generated using a weak algorithm such as MD5, then apps signed with the corresponding key are exposed to several risks, such as hijacking apps with fake updates or granting permissions to a malicious app. In this work, we analyze several Android apps to identify the threats caused by using weak algorithms. Our study uncovered the following findings: Of the more than one million apps collected from Google Play, 223 and 52,866 were digitally signed using the weak algorithms of 512-bit RSA key and MD5, respectively. We identified the causal mechanisms for generating certificates that employ weak algorithms, and found that these mechanisms can be attributed to app-building frameworks and online app-building services. On the basis of these findings, we provide guidelines for stakeholders of the Android app distribution ecosystem.
KW - Android
KW - Cryptographic algorithms
KW - Digital signature
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85076745876&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85076745876&partnerID=8YFLogxK
U2 - 10.2197/ipsjjip.27.593
DO - 10.2197/ipsjjip.27.593
M3 - Article
AN - SCOPUS:85076745876
SN - 0387-5806
VL - 27
SP - 593
EP - 602
JO - Journal of Information Processing
JF - Journal of Information Processing
ER -