Cargando…

On the Security of Application Installers and Online Software Repositories

The security of application installers is often overlooked, but the security risks associated to these pieces of code are not negligible. Online public repositories have been one of the most popular ways for end users to obtain software, but there is a lack of systematic security evaluation of popul...

Descripción completa

Detalles Bibliográficos
Autores principales: Botacin, Marcus, Bertão, Giovanni, de Geus, Paulo, Grégio, André, Kruegel, Christopher, Vigna, Giovanni
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7338200/
http://dx.doi.org/10.1007/978-3-030-52683-2_10
_version_ 1783554634458071040
author Botacin, Marcus
Bertão, Giovanni
de Geus, Paulo
Grégio, André
Kruegel, Christopher
Vigna, Giovanni
author_facet Botacin, Marcus
Bertão, Giovanni
de Geus, Paulo
Grégio, André
Kruegel, Christopher
Vigna, Giovanni
author_sort Botacin, Marcus
collection PubMed
description The security of application installers is often overlooked, but the security risks associated to these pieces of code are not negligible. Online public repositories have been one of the most popular ways for end users to obtain software, but there is a lack of systematic security evaluation of popular public repositories. In this paper, we bridge this gap by analyzing five popular software repositories. We focus on their software updating dynamics, as well as the presence of traces of vulnerable and/or trojanized applications among the top-100 most downloaded Windows programs on each of the evaluated repositories. We analyzed 2,935 unique programs collected in a period of 144 consecutive days. Our results show that: (i) the repositories frequently exhibit rank changes due to applications fast climbing toward the first positions; (ii) the repositories often update their payloads, which may cause the distribution of distinct binaries for the same intended application (binaries for the same applications may also be different in each repository); (iii) the installers are composed by multiple components and often download payloads from the Internet to complete their installation steps, posing new risks for users (we demonstrate that some installers are vulnerable to content tampering through man-in-the-middle attacks); (iv) the ever-changing nature of repositories and installers makes them prone to abuse, as we observed that 30% of all applications were reported malicious by at least one AV.
format Online
Article
Text
id pubmed-7338200
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73382002020-07-07 On the Security of Application Installers and Online Software Repositories Botacin, Marcus Bertão, Giovanni de Geus, Paulo Grégio, André Kruegel, Christopher Vigna, Giovanni Detection of Intrusions and Malware, and Vulnerability Assessment Article The security of application installers is often overlooked, but the security risks associated to these pieces of code are not negligible. Online public repositories have been one of the most popular ways for end users to obtain software, but there is a lack of systematic security evaluation of popular public repositories. In this paper, we bridge this gap by analyzing five popular software repositories. We focus on their software updating dynamics, as well as the presence of traces of vulnerable and/or trojanized applications among the top-100 most downloaded Windows programs on each of the evaluated repositories. We analyzed 2,935 unique programs collected in a period of 144 consecutive days. Our results show that: (i) the repositories frequently exhibit rank changes due to applications fast climbing toward the first positions; (ii) the repositories often update their payloads, which may cause the distribution of distinct binaries for the same intended application (binaries for the same applications may also be different in each repository); (iii) the installers are composed by multiple components and often download payloads from the Internet to complete their installation steps, posing new risks for users (we demonstrate that some installers are vulnerable to content tampering through man-in-the-middle attacks); (iv) the ever-changing nature of repositories and installers makes them prone to abuse, as we observed that 30% of all applications were reported malicious by at least one AV. 2020-06-11 /pmc/articles/PMC7338200/ http://dx.doi.org/10.1007/978-3-030-52683-2_10 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Botacin, Marcus
Bertão, Giovanni
de Geus, Paulo
Grégio, André
Kruegel, Christopher
Vigna, Giovanni
On the Security of Application Installers and Online Software Repositories
title On the Security of Application Installers and Online Software Repositories
title_full On the Security of Application Installers and Online Software Repositories
title_fullStr On the Security of Application Installers and Online Software Repositories
title_full_unstemmed On the Security of Application Installers and Online Software Repositories
title_short On the Security of Application Installers and Online Software Repositories
title_sort on the security of application installers and online software repositories
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7338200/
http://dx.doi.org/10.1007/978-3-030-52683-2_10
work_keys_str_mv AT botacinmarcus onthesecurityofapplicationinstallersandonlinesoftwarerepositories
AT bertaogiovanni onthesecurityofapplicationinstallersandonlinesoftwarerepositories
AT degeuspaulo onthesecurityofapplicationinstallersandonlinesoftwarerepositories
AT gregioandre onthesecurityofapplicationinstallersandonlinesoftwarerepositories
AT kruegelchristopher onthesecurityofapplicationinstallersandonlinesoftwarerepositories
AT vignagiovanni onthesecurityofapplicationinstallersandonlinesoftwarerepositories