Casing the Vault: Security Analysis of Vault Applications

Margie Ruffin, Israel Lopez-Toldeo, Kirill Levchenko, Gang Wang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Vault applications are a class of mobile apps used to store and hide users' sensitive files (e.g., photos, documents, and even another app) on the phone. In this paper, we perform an empirical analysis of popular vault apps under the scenarios of unjust search and filtration of civilians by authorities (e.g., during civil unrest). By limiting the technical capability of adversaries, we explore the feasibility of inferring the presence of vault apps and uncovering the hidden files without employing sophisticated forensics analysis. Our analysis of 20 popular vault apps shows that most of them do not adequately implement/configure their disguises, which can reveal their existence without technical analysis. In addition, adversaries with rudimentary-level knowledge of the Android system can already uncover the files stored in most of the vault apps. Our results indicate the need for more secure designs for vault apps.

Original languageEnglish (US)
Title of host publicationWPES 2022 - Proceedings of the 21st Workshop on Privacy in the Electronic Society, co-located with CCS 2022
PublisherAssociation for Computing Machinery
Pages175-180
Number of pages6
ISBN (Electronic)9781450398732
DOIs
StatePublished - Nov 7 2022
Event21st Workshop on Privacy in the Electronic Society, WPES 2022 - Los Angeles, United States
Duration: Nov 7 2022 → …

Publication series

NameWPES 2022 - Proceedings of the 21st Workshop on Privacy in the Electronic Society, co-located with CCS 2022

Conference

Conference21st Workshop on Privacy in the Electronic Society, WPES 2022
Country/TerritoryUnited States
CityLos Angeles
Period11/7/22 → …

Keywords

  • android
  • privacy
  • vault app

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Casing the Vault: Security Analysis of Vault Applications'. Together they form a unique fingerprint.

Cite this