Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tongxin Li is active.

Publication


Featured researches published by Tongxin Li.


computer and communications security | 2015

Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations

Yangyi Chen; Tongxin Li; XiaoFeng Wang; Kai Chen; Xinhui Han

In this paper, we report the first large-scale, systematic study on the security qualities of emerging push-messaging services, focusing on their app-side service integrations. We identified a set of security properties different push-messaging services (e.g., Google Cloud Messaging) need to have, and automatically verified them in different integrations using a new technique, called Seminal. Seminal is designed to extract semantic information from a services sample code, and leverage the information to evaluate the security qualities of the services SDKs and its integrations within different apps. Using this tool, we studied 30 leading services around the world, and scanned 35,173 apps. Our findings are astonishing: over 20% apps in Google Play and 50% apps in mainstream Chinese app markets are riddled with security-critical loopholes, putting a huge amount of sensitive user data at risk. Also, our research brought to light new types of security flaws never known before, which can be exploited to cause serious confusions among popular apps and services (e.g., Facebook, Skype, Yelp, Baidu Push). Taking advantage of such confusions, the adversary can post his content to the victims apps in the name of trusted parties and intercept her private messages. The study highlights the serious challenges in securing push-messaging services and an urgent need for improving their security qualities.


recent advances in intrusion detection | 2017

Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level

Kai Chen; Tongxin Li; Bin Ma; Peng Wang; XiaoFeng Wang; Peiyuan Zong

As a key stakeholder in mobile communications, the communication service provider (CSP, including carriers and ISPs) plays a critical role in safeguarding mobile users against potentially-harmful apps (PHA), complementing the security protection at app stores. However a CSP-level scan faces an enormous challenge: hundreds of millions of apps are installed everyday; retaining their download traffic to construct their packages entails a huge burden on the CSP side, forces them to change their infrastructure and can have serious privacy and legal ramifications. To control the cost and avoid trouble, today’s CSPs acquire apps from download URLs for a malware analysis. Even this step is extremely expensive and hard to meet the demand of online protection: for example, a CSP we are working with runs hundreds of machines to check the daily downloads it observes. To rise up to this challenge, we present in this paper an innovative “app baleen” (called Abaleen) framework for an on-line security vetting of an extremely large number of app downloads, through a high-performance, concurrent inspection of app content from the sources of the downloads. At the center of the framework is the idea of retrieving only a small amount of the content from the remote sources to identify suspicious app downloads and warn the end users, hopefully before the installation is complete. Running on 90 million download URLs recorded by our CSP partner, our screening framework achieves an unparalleled performance, with a nearly 85\(\times \) speed-up compared to the existing solution. This level of performance enables an online vetting for PHAs at the CSP scale: among all unique URLs used in our study, more than 95% were processed before the completion of unfettered downloads. With the CSP-level dataset, we revealed not only the surprising pervasiveness of PHAs, but also the real impact of them (over 2 million installs in merely 3 days).


dependable systems and networks | 2017

Ghost Installer in the Shadow: Security Analysis of App Installation on Android

Yeonjoon Lee; Tongxin Li; Nan Zhang; Soteris Demetriou; Mingming Zha; XiaoFeng Wang; Kai Chen; Xiaoyong Zhou; Xinhui Han; Michael Grace

Android allows developers to build apps with app installation functionality themselves with minimal restriction and support like any other functionalities. Given the critical importance of app installation, the security implications of the approach can be significant. This paper reports the first systematic study on this issue, focusing on the security guarantees of different steps of the App Installation Transaction (AIT). We demonstrate the serious consequences of leaving AIT development to individual developers: most installers (e.g., Amazon AppStore, DTIgnite, Baidu) are riddled with various security-critical loopholes, which can be exploited by attackers to silently install any apps, acquiring dangerous-level permissions or even unauthorized access to system resources. Surprisingly, vulnerabilities were found in all steps of AIT. The attacks we present, dubbed Ghost Installer Attack (GIA), are found to pose a realistic threat to Android ecosystem. Further, we developed both a user-app-level and a system-level defense that are innovative and practical.


computer and communications security | 2014

POSTER: AdHoneyDroid -- Capture Malicious Android Advertisements

Dongqi Wang; Shuaifu Dai; Yu Ding; Tongxin Li; Xinhui Han

In this paper we explore the problem of collecting malicious smartphone advertisements. Most smartphone app contains advertisements and also suffers from vulnerable advertisement libraries. Malicious advertisements exploit the ad library vulnerability and attack victim smartphones. Similar to the traditional honeypots, we need an effective way to capture malicious ads. In this paper, we provide our approach named AdHoneyDroid. We build a crawler to gather apps on the android marketplaces and manually collect ad libraries and their vulnerabilities. Then AdHoneyDroid executes the apps and detects malicious advertisements. In our approach, we adopt the idea of API sandbox and TaintDroid to detect the attack event. We store the malicious advertisements in a database for future analysis. Malicious ads can help security analysts have a better understanding of current mobile attacks and also disclose the attack payloads.


Cybersecurity | 2018

Detecting telecommunication fraud by understanding the contents of a call

Qianqian Zhao; Kai Chen; Tongxin Li; Yi Yang; XiaoFeng Wang

Telecommunication fraud has continuously been causing severe financial loss to telecommunication customers in China for several years. Traditional approaches to detect telecommunication frauds usually rely on constructing a blacklist of fraud telephone numbers. However, attackers can simply evade such detection by changing their numbers, which is very easy to achieve through VoIP (Voice over IP). To solve this problem, we detect telecommunication frauds from the contents of a call instead of simply through the caller’s telephone number. Particularly, we collect descriptions of telecommunication fraud from news reports and social media. We use machine learning algorithms to analyze data and to select the high-quality descriptions from the data collected previously to construct datasets. Then we leverage natural language processing to extract features from the textual data. After that, we build rules to identify similar contents within the same call for further telecommunication fraud detection. To achieve online detection of telecommunication frauds, we develop an Android application which can be installed on a customer’s smartphone. When an incoming fraud call is answered, the application can dynamically analyze the contents of the call in order to identify frauds. Our results show that we can protect customers effectively.


computer and communications security | 2014

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services

Tongxin Li; Xiaoyong Zhou; Luyi Xing; Yeonjoon Lee; Muhammad Naveed; XiaoFeng Wang; Xinhui Han


computer and communications security | 2015

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS

Luyi Xing; Xiaolong Bai; Tongxin Li; XiaoFeng Wang; Kai Chen; Xiaojing Liao; Shi-Min Hu; Xinhui Han


ieee symposium on security and privacy | 2016

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf

Xiaolong Bai; Luyi Xing; Nan Zhang; XiaoFeng Wang; Xiaojing Liao; Tongxin Li; Shi-Min Hu


computer and communications security | 2017

Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews

Tongxin Li; Xueqiang Wang; Mingming Zha; Kai Chen; XiaoFeng Wang; Luyi Xing; Xiaolong Bai; Nan Zhang; Xinhui Han


arXiv: Cryptography and Security | 2015

Unauthorized Cross-App Resource Access on MAC OS X and iOS.

Luyi Xing; Xiaolong Bai; Tongxin Li; XiaoFeng Wang; Kai Chen; Xiaojing Liao; Shi-Min Hu; Xinhui Han

Collaboration


Dive into the Tongxin Li's collaboration.

Top Co-Authors

Avatar

XiaoFeng Wang

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kai Chen

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Luyi Xing

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nan Zhang

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiaojing Liao

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaoyong Zhou

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Xueqiang Wang

Indiana University Bloomington

View shared research outputs
Researchain Logo
Decentralizing Knowledge