Attacking and fixing the android protected confirmation protocol

Myrto Arapinis, Vincent Danos, Maïwenn Racouchot, David A. R. Robin, Thomas Zacharias

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Android Protected Confirmation (APC) is an authentication protocol designed by Google. It leverages the extra security of the Trusted Execution Environment (TEE) to secure transactions even in the presence of a compromised OS. The intended security guarantee for APC is that if a transaction has been signed under APC, then the user must have previously given its explicit consent, even if an attacker has gained root access to the victim’s Android OS. In this paper, we present a security analysis of APC in the Universal Composability (UC) framework. We uncover two attacks on the design of the protocol which allow a root adversary to issue transactions without the user consenting to them. We provide an attack implementation on a Google Pixel phone, and propose light-weight fixes. Finally, we specify the ideal UC functionality capturing the intended security guarantees for APC, and prove that the fixed protocol UC-realizes it.
Original languageEnglish
Title of host publicationProceedings of the 10th IEEE European Symposium on Security and Privacy
PublisherInstitute of Electrical and Electronics Engineers
Pages1-22
Number of pages22
Publication statusAccepted/In press - 29 Mar 2025
EventThe 10th IEEE European Symposium on Security and Privacy - Ca' Foscari University of Venice, Venice, Italy
Duration: 30 Jun 20254 Jul 2025
Conference number: 10
https://eurosp2025.ieee-security.org/

Publication series

NameIEEE European Symposium on Security and Privacy
PublisherInstitute of Electrical and Electronics Engineers
ISSN (Print)2995-1348
ISSN (Electronic)2995-1356

Symposium

SymposiumThe 10th IEEE European Symposium on Security and Privacy
Abbreviated titleEuroS&P 2025
Country/TerritoryItaly
CityVenice
Period30/06/254/07/25
Internet address

Keywords / Materials (for Non-textual outputs)

  • trusted execution environments
  • android
  • authentication
  • universal composability

Fingerprint

Dive into the research topics of 'Attacking and fixing the android protected confirmation protocol'. Together they form a unique fingerprint.

Cite this