App Guarden: Resilient Application Stores

Lead Research Organisation: University of Edinburgh
Department Name: Sch of Informatics

Abstract

Application stores are set to become the dominant model for software distribution. After only four years, they are incredibly successful. In 2012, Apple's App Store and Google's Play Store each topped 25 billion app downloads. App stores not only offer apps and media content, they also have near total control on phones and tablets that connect to them. Hundreds of millions of people place their trust in app store and device security every day. Unfortunately, this trust is sometimes misplaced and is starting to be eroded.

Also in 2012, mobile malware took off: tens of thousands of rogue apps have been found `in the wild', including premium-rate SMS-sending apps, mobile botnets that are orchestrated to attack others, Trojans that steal passwords, and spyware that monitors users' activities. Legitimate apps and mobile operating systems have also had flaws leading to exploits and information leaks. And as the Wired reporter Mat Honan discovered painfully this summer, the convenience of cloud backed-up synchronized devices means that a single break-in can destroy your data everywhere, in one fell swoop.

App stores of the future, and the devices they control, must be better defended and resilient under attack. Users and data owners need justifiable confidence that apps will behave well and will not cause damage, whether by accident through bugs, or by intention through malicious design. Security should be ever present but unobtrusive, not impacting performance or causing crashes, not forever downloading patches, not demanding complex decisions, and not in the hands of just one party.

Our research will examine a number of improvements to app stores and mobile device operating systems which will take us closer to future generation, secure app stores.

For example, we will design algorithms that will automatically analyse apps to ensure they are safe. At the moment, this has to be done manually by malware analysts in expensive, time-consuming and sometimes unreliable ways. Another improvement is to add "digital evidence" to apps. Digital evidence can guarantee that an app is safe and it can be checked automatically, even on a phone. Evidence establishes that the code is safe, whereas the current state-of-the-art in industry is code signing, which at best only says where the code has come from. Finally, we want to find natural, user-friendly security policies: rather than the user examining a long list of complicated permissions as currently happens in Android, we want to have a set of sensible policies for different types of app. Under the bonnet the controls will actually be more precise than at present: with our solution, a game, for example, would not be allowed to access anywhere on the Internet, just the few places that it really needs to go; a text-messaging app might only be allowed to send messages to contacts from a users address book, not unknown numbers that might be premium-rate.

Planned Impact

0. Overview

Smart phones and tablets are rapidly pervading everyday life and even starting to play a role in national infrastructure. They are administered through app stores, which are set to become the dominant model for software distribution.

To help deliver on the UK Cyber Security Strategy, our research will provide new foundations for a resilient, symbiotic system of app store and devices that reduces risks to individuals, data owners and wider society. We will ensure impact by a number of routes, engaging directly with three major industry players as well as with several SMEs.

1. Who will benefit from this research?

The medium and long-term beneficiaries of this research will be parties who have a stake in the app store distribution model of software and who rely on software delivered that way:

- Private sector, such as developers of mobile operating systems and their app stores (e.g., Google, RIM); app developers (e.g., Kotikan); security and anti-malware companies (e.g., McAfee, Metaforic); and emerging new ventures that supply or run custom app stores. Further out, corporates including banks will benefit from better platform security, giving them confidence to enable more risky functionality in apps.

- Government and public sector, many parts of which will deploy apps to provide access to records for citizens (e.g., NHS, HMRC, DVLA and other parts of direct.gov). There are obvious concerns over information leaks. Apps can be more risky than web interfaces because they often run on devices which provide API access to personal information.

- UK citizens, such as end users of smartphones or tablets, with privacy and security concerns.

- The UK nation state, in the sense of organisations involved in defence against malicious software attacking national infrastructure, in particular GCHQ and CESG.

- Our researchers and project students, for the RAs and project students involved in our programme: they will learn new skills, gain experiences, forge collaborations, and be prepared for the job market.

By feeding into possible secure app store initiatives within the large providers and smaller organisations, the project may help the advance the global competitiveness of the UK's IT industry and our reputation as a secure place to do business.

2. How will they benefit from the research?

- We will enable technology that gives private sector companies competitive advantage, by making security improvements to existing app stores and mobile operating systems, or new opportunities, by selling custom app stores or novel security products.

- Our security policies and analyses will help app stores defend themselves against malware and accidental errors, also ensuring developers produce better secured applications; these improvements will result in better security for government, companies and private individuals. They will be better protected against data loss and privacy intrusion.

- The technology will empower users and distributors of mobile software to better understand security implications of downloaded software, instead of blindly trusting it.
 
Description We developed a range of techniques and tools that help security analysts determine whether mobile applications may have insecure effects, for example, exposing personal information to unauthorized parties. We designed algorithms that automatically analyse apps to ensure they are safe. Previously, this was done manually by malware analysts in expensive, time-consuming and sometimes unreliable ways. Another improvement has been to add "digital evidence" to apps. Digital evidence can guarantee that an app is safe and it can be checked automatically, even on a phone. Evidence establishes that the code is safe, whereas the current state-of-the-art in industry is code signing, which at best only says where the code has come from. Finally, we investigated user-friendly security policies and ways of connecting policies together: rather than the user examining a long list of complicated permissions as currently happens in Android, we want to have a set of sensible policies for different types of app.
Exploitation Route We have been working together with some industry representatives and also experts in GCHQ to see where the technologies we have developed may be applied. This is still active and in progress --- the project has some follow-on research being funded by the GCHQ/National Cyber Security Centre. In future we hope some of the ideas may be adopted in practical technologies, for example, providing security checks for software in the supply chain for mobile apps or other software components, e.g., in Internet of Things.
Sectors Digital/Communication/Information Technologies (including Software),Financial Services, and Management Consultancy,Healthcare,Security and Diplomacy

URL http://groups.inf.ed.ac.uk/security/appguarden
 
Description Predicting the Security Behaviour of Mobile Apps
Amount $432,000 (USD)
Organisation ONRG Office of Naval Research Global 
Sector Public
Country United States
Start 11/2017 
End 10/2020
 
Description McAfee (now Intel Security) 
Organisation McAfee
Country United States 
Sector Private 
PI Contribution Discussions and research visits with company developing anti-malware products and services
Collaborator Contribution Discussions and research visits with company developing anti-malware products and services
Impact No individual specific identifiable outputs
Start Year 2013
 
Description NIMBUS EPSRC Network 
Organisation Queen's University Belfast
Country United Kingdom 
Sector Academic/University 
PI Contribution EP/K003445/1 Network in Internet and Mobile Malicious Software (NIMBUS) Active member in Network activities
Collaborator Contribution Industry and other academic partners provided valuable discussions on recent research and industry needs
Impact N/A
Start Year 2013
 
Title Evicheck 
Description Tool to check Android applications for malicious activities. Produces and verifies evidence. 
Type Of Technology Software 
Year Produced 2016 
Open Source License? Yes  
Impact N/A 
URL http://groups.inf.ed.ac.uk/security/appguarden/tools/EviCheck/
 
Description Command and Control (concept, storyboard, show reel) 
Form Of Engagement Activity Engagement focused website, blog or social media channel
Part Of Official Scheme? No
Geographic Reach National
Primary Audience Media (as a channel to the public)
Results and Impact Command_and_Control has two aims. First, we recognise that cyber security and privacy has an increasingly vital role in young people's online lives and often needs to be managed better. Digital devices, sharing data and interacting with online identities dominate youth leisure time. But 2016/2017 NSPCC and Childline reports document an 88% rise in calls to them because of online bullying, cyber security breaches and cyber extortion; the worst cases contribute to the devastating growth in youth suicide. Moreover, some types of online extortion, bullying and harassment targeted at youths link back to cyber criminals who recruit youth into global trafficking and radicalisation. Contributing to the wider initiatives that society needs to address these problems, we hope to provide accessible, appealing ways to explain principles and effects of cyber hygiene and responsibility for personal data and interactions. As our second aim, we hope that by inspiring interest in cyber security concepts and importance, we can help encourage youth audiences to pursue education and careers in cyber security, fostering the UK's goal to engage youth and build a next generation of cyber security experts.

Command_and_Control is conceived as a live, educational lecture featuring an immersive data exfiltration experience played out as a game with the audience. The lecture follows a series of learning points, each one covering a plot point in a story, accompanied by an Augmented Reality app that the audience uses to determine choices made by the characters in the story. The lecture educates young people on what data their mobile devices are constantly giving out, how devices and accounts can be compromised without user awareness and gives them an experience of how choices make about data they store and share on digital devices might implicate them in unwanted outcomes.

The project was supported in 2018-19 with a small grant from the National Cyber Security Centre. The present stage of the plan is to investigate development first as a TV series. It is presently seeking further financial sources for funding and a production deal. Some money has been offered as an option by a production company, won in a competition in 2019.

Status of project in 2019:
- interest from a distributor to take the concept out to production companies for a development deal. To help them make their
approaches, we've been asked for scripts and storyboards for at least the first few episodes of the proposed TV series. No funding available to do this yet.
- Other funding sources being approached (e.g. broadcasters).

See successful pitch by R. Sofer at Children's Media Conference pitching competiton (35:00-42:00):

https://www.thechildrensmediaconference.com/sessions/put-your-money-where-your-mouth-is-4
Year(s) Of Engagement Activity 2017,2018,2019
URL https://www.youtube.com/watch?reload=9&v=Aia6M2ZQRvs
 
Description Midlothian Science Festival 2016 
Form Of Engagement Activity Participation in an activity, workshop or similar
Part Of Official Scheme? No
Geographic Reach Regional
Primary Audience Public/other audiences
Results and Impact Presented as the iSpy game, members of the public (children aged 8-12 and their parents) were assigned into two teams and given a controlled experience of real-time data exfiltration, and made aware of research into checkers that can provide digital evidence of the security status of apps.

Assisted by our researchers, Team Fun's mission was to play a game: Their game was to identify pixelated images on a screen using the camera app on their Android device, take a picture of the image, store it on the phone as their wallpaper, and make an audio recording of their name and what they saw - all in under 30 seconds before handing the device to the next player in the team to take a turn!

To play the game, they had to first download an image wallpaper app and a sound recording microphone app, choosing from apps in a simplified app store.

Also assisted by our researchers, Team HaHa's mission was to play a different game: their game was to secretly monitor and exfiltrate data from Team Fun's phone as they played the game - spying activities made possible by the presence of malevolent code in the apps Team Fun had chosen to install. Team HaHa were also able to take command of Team Fun's camera phone - taking pictures of Team Fun members as they innocently played their game!

At the end of the game, Team HaHa were able to send Team Fun's device screen shots of the images they had seen as they played their game, and photos of Team Fun players taken from the Team Fun device covertly.

The ability to do this simply by a "bad" app shocked both teams. Their curiosity at how this was possible, served as our researchers' opportunity to close the event by demonstrating teaching points on making better choices of applications, based on permissions or by using an example checking tool, one of the research protoypes developed under App Guarden.

In a final demonstration of checkers and validity, players were invited by our researchers to try the App Guarden checkers and replay the game, finding that this time it identified the bad code in the apps that Team Fun had downloaded - and warned against downloading it. The safe versions of the apps prevented Team HaHa from spying on the files and camera on the first device.
Year(s) Of Engagement Activity 2016
URL http://groups.inf.ed.ac.uk/security/appguarden/Outreach.html