Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kan Yuan is active.

Publication


Featured researches published by Kan Yuan.


ieee symposium on security and privacy | 2014

Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating

Luyi Xing; Xiaorui Pan; Rui Wang; Kan Yuan; XiaoFeng Wang

Android is a fast evolving system, with new updates coming out one after another. These updates often completely overhaul a running system, replacing and adding tens of thousands of files across Androids complex architecture, in the presence of critical user data and applications (apps for short). To avoid accidental damages to such data and existing apps, the upgrade process involves complicated program logic, whose security implications, however, are less known. In this paper, we report the first systematic study on the Android updating mechanism, focusing on its Package Management Service (PMS). Our research brought to light a new type of security-critical vulnerabilities, called Pileup flaws, through which a malicious app can strategically declare a set of privileges and attributes on a low-version operating system (OS) and wait until it is upgraded to escalate its privileges on the new system. Specifically, we found that by exploiting the Pileup vulnerabilities, the app can not only acquire a set of newly added system and signature permissions but also determine their settings (e.g., protection levels), and it can further substitute for new system apps, contaminate their data (e.g., cache, cookies of Android default browser) to steal sensitive user information or change security configurations, and prevent installation of critical system services. We systematically analyzed the source code of PMS using a program verification tool and confirmed the presence of those security flaws on all Android official versions and over 3000 customized versions. Our research also identified hundreds of exploit opportunities the adversary can leverage over thousands of devices across different device manufacturers, carriers and countries. To mitigate this threat without endangering user data and apps during an upgrade, we also developed a new detection service, called SecUP, which deploys a scanner on the users device to capture the malicious apps designed to exploit Pileup vulnerabilities, based upon the vulnerability-related information automatically collected from newly released Android OS images.


ieee symposium on security and privacy | 2015

Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android

Nan Zhang; Kan Yuan; Muhammad Naveed; Xiaoyong Zhou; XiaoFeng Wang

Stealing of sensitive information from apps is always considered to be one of the most critical threats to Android security. Recent studies show that this can happen even to the apps without explicit implementation flaws, through exploiting some design weaknesses of the operating system, e.g., Shared communication channels such as Bluetooth, and side channels such as memory and network-data usages. In all these attacks, a malicious app needs to run side-by-side with the target app (the victim) to collect its runtime information. Examples include recording phone conversations from the phone app, gathering WebMDs data usages to infer the disease condition the user looks at, etc. This runtime-information-gathering (RIG) threat is realistic and serious, as demonstrated by prior research and our new findings, which reveal that the malware monitoring popular Android-based home security systems can figure out when the house is empty and the user is not looking at surveillance cameras, and even turn off the alarm delivered to her phone. To defend against this new category of attacks, we propose a novel technique that changes neither the operating system nor the target apps, and provides immediate protection as soon as an ordinary app (with only normal and dangerous permissions) is installed. This new approach, called App Guardian, thwarts a malicious apps runtime monitoring attempt by pausing all suspicious background processes when the target app (called principal) is running in the foreground, and resuming them after the app stops and its runtime environment is cleaned up. Our technique leverages a unique feature of Android, on which third-party apps running in the background are often considered to be disposable and can be stopped anytime with only a minor performance and utility implication. We further limit such an impact by only focusing on a small set of suspicious background apps, which are identified by their behaviors inferred from their side channels (e.g., Thread names, CPU scheduling and kernel time). App Guardian is also carefully designed to choose the right moments to start and end the protection procedure, and effectively protect itself against malicious apps. Our experimental studies show that this new technique defeated all known RIG attacks, with small impacts on the utility of legitimate apps and the performance of the OS. Most importantly, the idea underlying our approach, including app-level protection, side-channel based defense and lightweight response, not only significantly raises the bar for the RIG attacks and the research on this subject but can also inspire the follow-up effort on new detection systems practically deployable in the fragmented Android ecosystem.


ieee symposium on security and privacy | 2016

Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search

Xiaojing Liao; Kan Yuan; XiaoFeng Wang; Zhongyu Pei; Hao Yang; Jianjun Chen; Haixin Duan; Kun Du; Eihal Alowaisheq; Sumayah A. Alrwais; Luyi Xing; Raheem A. Beyah

Promotional infection is an attack in which the adversary exploits a websites weakness to inject illicit advertising content. Detection of such an infection is challenging due to its similarity to legitimate advertising activities. An interesting observation we make in our research is that such an attack almost always incurs a great semantic gap between the infected domain (e.g., a university site) and the content it promotes (e.g., selling cheap viagra). Exploiting this gap, we developed a semantic-based technique, called Semantic Inconsistency Search (SEISE), for efficient and accurate detection of the promotional injections on sponsored top-level domains (sTLD) with explicit semantic meanings. Our approach utilizes Natural Language Processing (NLP) to identify the bad terms (those related to illicit activities like fake drug selling, etc.) most irrelevant to an sTLDs semantics. These terms, which we call irrelevant bad terms (IBTs), are used to query search engines under the sTLD for suspicious domains. Through a semantic analysis on the results page returned by the search engines, SEISE is able to detect those truly infected sites and automatically collect new IBTs from the titles/URLs/snippets of their search result items for finding new infections. Running on 403 sTLDs with an initial 30 seed IBTs, SEISE analyzed 100K fully qualified domain names (FQDN), and along the way automatically gathered nearly 600 IBTs. In the end, our approach detected 11K infected FQDN with a false detection rate of 1.5% and over 90% coverage. Our study shows that by effective detection of infected sTLDs, the bar to promotion infections can be substantially raised, since other non-sTLD vulnerable domains typically have much lower Alexa ranks and are therefore much less attractive for underground advertising. Our findings further bring to light the stunning impacts of such promotional attacks, which compromise FQDNs under 3% of .edu, .gov domains and over one thousand gov.cn domains, including those of leading universities such as stanford.edu, mit.edu, princeton.edu, havard.edu and government institutes such as nsf.gov and nih.gov. We further demonstrate the potential to extend our current technique to protect generic domains such as .com and .org.


usenix security symposium | 2014

Understanding the dark side of domain parking

Sumayah A. Alrwais; Kan Yuan; Eihal Alowaisheq; Zhou Li; XiaoFeng Wang


computer and communications security | 2016

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

Xiaojing Liao; Kan Yuan; XiaoFeng Wang; Zhou Li; Luyi Xing; Raheem A. Beyah


network and distributed system security symposium | 2015

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources

Soteris Demetriou; Xiaoyong Zhou; Muhammad Naveed; Yeonjoon Lee; Kan Yuan; XiaoFeng Wang; Carl A. Gunter


annual computer security applications conference | 2016

Catching predators at watering holes: finding and understanding strategically compromised websites

Sumayah A. Alrwais; Kan Yuan; Eihal Alowaisheq; Xiaojing Liao; Alina Oprea; XiaoFeng Wang; Zhou Li


computer and communications security | 2016

Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service

Xiaojing Liao; Sumayah A. Alrwais; Kan Yuan; Luyi Xing; XiaoFeng Wang; Shuang Hao; Raheem A. Beyah


usenix security symposium | 2018

Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces.

Kan Yuan; Haoran Lu; Xiaojing Liao; XiaoFeng Wang


network and distributed system security symposium | 2018

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.

Peng Wang; Xianghang Mi; Xiaojing Liao; XiaoFeng Wang; Kan Yuan; Feng Qian; Raheem A. Beyah

Collaboration


Dive into the Kan Yuan's collaboration.

Top Co-Authors

Avatar

XiaoFeng Wang

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Xiaojing Liao

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Luyi Xing

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Raheem A. Beyah

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sumayah A. Alrwais

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Eihal Alowaisheq

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Zhou Li

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Feng Qian

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Nan Zhang

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Xianghang Mi

Indiana University Bloomington

View shared research outputs
Researchain Logo
Decentralizing Knowledge