GUI-Squatting attack: automated generation of Android phishing apps

Mobile phishing attacks, such as mimic mobile browser pages, masquerade as legitimate applications by leveraging repackaging or clone techniques, have caused varied yet significant security concerns. Consequently, detection techniques have been receiving increasing attention. However, many such dete...

Full description

Bibliographic Details
Main Authors: Chen, Sen, Fan, Lingling, Chen, Chunyang, Xue, Minhui, Liu, Yang, Xu, Lihua
Other Authors: School of Computer Science and Engineering
Format: Journal Article
Language:English
Published: 2022
Subjects:
Online Access:https://hdl.handle.net/10356/160302
_version_ 1811676935022968832
author Chen, Sen
Fan, Lingling
Chen, Chunyang
Xue, Minhui
Liu, Yang
Xu, Lihua
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Chen, Sen
Fan, Lingling
Chen, Chunyang
Xue, Minhui
Liu, Yang
Xu, Lihua
author_sort Chen, Sen
collection NTU
description Mobile phishing attacks, such as mimic mobile browser pages, masquerade as legitimate applications by leveraging repackaging or clone techniques, have caused varied yet significant security concerns. Consequently, detection techniques have been receiving increasing attention. However, many such detection methods are not well tested and may therefore still be vulnerable to new types of phishing attacks. In this article, we propose a new attacking technique, named GUI-Squatting attack, which can generate phishing apps (phapps) automatically and effectively on the Android platform. Our method adopts image processing and deep learning algorithms, to enable powerful and large-scale attacks. We observe that a successful phishing attack requires two conditions, page confusion and logic deception during attacks synthesis. We directly optimize these two conditions to create a practical attack. Our experimental results reveal that existing phishing defenses are less effective against such emergent attacks and may, therefore, stimulate more efficient detection techniques. To further demonstrate that our generated phapps can not only bypass existing detection techniques, but also deceive real users, we conduct a human study and successfully steal users' login information. The human study also shows that different response messages (e.g., 'Crash' and 'Server failed') after pressing the login button mislead users to regard our phapps as functionality problems instead of security threats. Extensive experiments reveal that such newly proposed attacks still remain mostly undetected, and are worth further exploration.
first_indexed 2024-10-01T02:29:22Z
format Journal Article
id ntu-10356/160302
institution Nanyang Technological University
language English
last_indexed 2024-10-01T02:29:22Z
publishDate 2022
record_format dspace
spelling ntu-10356/1603022022-07-19T02:42:57Z GUI-Squatting attack: automated generation of Android phishing apps Chen, Sen Fan, Lingling Chen, Chunyang Xue, Minhui Liu, Yang Xu, Lihua School of Computer Science and Engineering Engineering::Computer science and engineering Phishing Graphical User Interfaces Mobile phishing attacks, such as mimic mobile browser pages, masquerade as legitimate applications by leveraging repackaging or clone techniques, have caused varied yet significant security concerns. Consequently, detection techniques have been receiving increasing attention. However, many such detection methods are not well tested and may therefore still be vulnerable to new types of phishing attacks. In this article, we propose a new attacking technique, named GUI-Squatting attack, which can generate phishing apps (phapps) automatically and effectively on the Android platform. Our method adopts image processing and deep learning algorithms, to enable powerful and large-scale attacks. We observe that a successful phishing attack requires two conditions, page confusion and logic deception during attacks synthesis. We directly optimize these two conditions to create a practical attack. Our experimental results reveal that existing phishing defenses are less effective against such emergent attacks and may, therefore, stimulate more efficient detection techniques. To further demonstrate that our generated phapps can not only bypass existing detection techniques, but also deceive real users, we conduct a human study and successfully steal users' login information. The human study also shows that different response messages (e.g., 'Crash' and 'Server failed') after pressing the login button mislead users to regard our phapps as functionality problems instead of security threats. Extensive experiments reveal that such newly proposed attacks still remain mostly undetected, and are worth further exploration. National Research Foundation (NRF) This work is partially supported by National Satellite of Excellence in Trustworthy Software System (Award No. NRF2018NCR-NSOE003-0001) and the National Research Foundation, Prime Ministers Office, Singapore under its National Cybersecurity R&D Program (Award No. NRF2018NCR-NCR005-0001). Lihua Xu is supported in part by NSFC Grant 61502170, the Science and Technology Commission of Shanghai Municipality Grants 18511103802. 2022-07-19T02:42:57Z 2022-07-19T02:42:57Z 2019 Journal Article Chen, S., Fan, L., Chen, C., Xue, M., Liu, Y. & Xu, L. (2019). GUI-Squatting attack: automated generation of Android phishing apps. IEEE Transactions On Dependable and Secure Computing, 18(6), 2551-2568. https://dx.doi.org/10.1109/TDSC.2019.2956035 1545-5971 https://hdl.handle.net/10356/160302 10.1109/TDSC.2019.2956035 2-s2.0-85119497684 6 18 2551 2568 en NRF2018NCR-NSOE003-0001 NRF2018NCR-NCR005-0001 IEEE Transactions on Dependable and Secure Computing © 2019 IEEE. All rights reserved.
spellingShingle Engineering::Computer science and engineering
Phishing
Graphical User Interfaces
Chen, Sen
Fan, Lingling
Chen, Chunyang
Xue, Minhui
Liu, Yang
Xu, Lihua
GUI-Squatting attack: automated generation of Android phishing apps
title GUI-Squatting attack: automated generation of Android phishing apps
title_full GUI-Squatting attack: automated generation of Android phishing apps
title_fullStr GUI-Squatting attack: automated generation of Android phishing apps
title_full_unstemmed GUI-Squatting attack: automated generation of Android phishing apps
title_short GUI-Squatting attack: automated generation of Android phishing apps
title_sort gui squatting attack automated generation of android phishing apps
topic Engineering::Computer science and engineering
Phishing
Graphical User Interfaces
url https://hdl.handle.net/10356/160302
work_keys_str_mv AT chensen guisquattingattackautomatedgenerationofandroidphishingapps
AT fanlingling guisquattingattackautomatedgenerationofandroidphishingapps
AT chenchunyang guisquattingattackautomatedgenerationofandroidphishingapps
AT xueminhui guisquattingattackautomatedgenerationofandroidphishingapps
AT liuyang guisquattingattackautomatedgenerationofandroidphishingapps
AT xulihua guisquattingattackautomatedgenerationofandroidphishingapps