Paper 2015/709
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception
Luka Malisa, Kari Kostiainen, and Srdjan Capkun
Abstract
Mobile application spoofing is an attack where a malicious mobile application mimics the visual appearance of another one. If such an attack is successful, the integrity of what the user sees as well as the confidentiality of what she inputs into the system can be violated by the adversary. A common example of mobile application spoofing is a phishing attack where the adversary tricks the user into revealing her password to a malicious application that resembles the legitimate one. In this work, we propose a novel approach for addressing mobile application spoofing attacks by leveraging the visual similarity of application screens. We use deception rate as a novel metric for measuring how many users would confuse a spoofing application for the genuine one. We conducted a large-scale online study where participants evaluated spoofing samples of popular mobile applications. We used the study results to design and implement a prototype spoofing detection system, tailored to the estimation of deception rate for mobile application login screens.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- mobile security
- Contact author(s)
- luka malisa @ inf ethz ch
- History
- 2017-01-09: last of 3 revisions
- 2015-07-18: received
- See all versions
- Short URL
- https://ia.cr/2015/709
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/709, author = {Luka Malisa and Kari Kostiainen and Srdjan Capkun}, title = {Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/709}, year = {2015}, url = {https://eprint.iacr.org/2015/709} }