The advancements in the digitization world has revolutionized the automotive industry. Today's modern cars are equipped with internet, computers that can provide autonomous driving functionalities as well as infotainment systems that can run mobile operating systems, like Android Auto and Apple CarPlay. Android Automotive is Google's android operating system tailored to run natively on vehicle's infotainment systems, it allows third party apps to be installed and run on vehicle's infotainment systems. Such apps may raise security concerns related to user's safety, security and privacy. This paper investigates security concerns of in-vehicle apps, specifically, those related to inter component communication (ICC) among these apps. ICC allows apps to share information via inter or intra apps components through a messaging object called intent. In case of insecure communication, Intent can be hijacked or spoofed by malicious apps and user's sensitive information can be leaked to hacker's database. We investigate the attack surface and vulnerabilities in these apps and provide a static analysis approach and a tool to find data leakage vulnerabilities. The approach can also provide hints to mitigate these leaks. We evaluate our approach by analyzing a set of Android Auto apps downloaded from Google Play store, and we report our validated results on vulnerabilities identified on those apps.
翻译:数字化世界的进步使汽车产业发生了革命性的变化。 今天的现代汽车已经装备了互联网,计算机可以提供自主驱动功能和信息系统,可以运行移动操作系统,如Android Auto and Apple CarPlay。 Android Automotive是Google的和机器人操作系统,专门在汽车的信息系统上本地运行,允许在汽车的信息系统上安装第三方应用程序并运行。这些应用程序可能会引起与用户安全、安保和隐私有关的安保问题。本文调查了车辆内应用程序的安全关切,尤其是与这些应用程序中组件间通信(ICC)相关的安全关切。ICC允许应用程序通过一个叫作意图的信息对象通过内部或内部应用程序组成部分共享信息。在不安全的通信中,Intent可以被恶意应用程序劫持或渗透,用户的敏感信息可以泄露到黑客的信息系统数据库。我们调查这些应用程序的攻击表面和弱点,并提供静态分析方法和工具以查找这些应用程序中的数据渗漏脆弱性。 ICTC允许应用程序通过一个被称为“意图”的信息工具,我们也可以通过这些工具来分析我们所识别到的系统,我们通过浏览这些安全漏洞。