Skip to Content

Android Ads Could Attack, Study Warns

Ad libraries, bundled with free apps, could sniff data and even install malicious software.
March 19, 2012

To guard against malicious behavior, apps that run on Android smart phones must ask politely for permission to do things like access your personal information, track your location, or transmit data via the Internet. But once they have approval, these apps can share the permissions with the advertising libraries they use to serve up ads, creating serious potential privacy and security vulnerabilities, researchers have found.

Trap Door: This permission screen—typical for a free Android app—also grants the same permissions to the app’s ad libraries.

Combing through 100,000 apps selected randomly from Google Play (the erstwhile Android Market), a team of researchers at North Carolina State University found that 48,139 of the ad libraries used by these apps tracked the user’s GPS location; 18,575 tracked the identity of the phone (its IMEI number); 4,190 let advertisers track the user via GPS; and 4,047 accessed the device’s phone number.

Dozens of such “ad libraries” exist, generating onscreen ads with the associated apps. When you click on an ad, the app maker gets a fee. One of these libraries, called energysource, uses an insecure method of loading code from the Internet, says Xuxian Jiang, the North Carolina professor who led the study, released as a paper to be presented at a conference in Tucson next month. Though the researchers did not detect malicious behavior from the app, they did say it poses a security threat simply by allowing code to be downloaded and run.

Of the 100,000 apps, 297 contained ad code that allowed the phone to run code downloaded from the Internet, providing a potential path for malicious software to get inside the device. “If your app has permission to access personal information, the ad library also has permission to access your information,” Jiang says.

The North Carolina research is only the latest evidence of gaping security and privacy holes in smart phones. In April of last year, iPhones and Android devices were found to track users’ locations automatically. Then, in December, these and other smart-phone devices were found to carry diagnostic software that also tracks a wide range of user information. More recently, it was discovered that both iPhones and Android devices share users’ address books and other information with apps. And instances of mobile malware have been rising.

The new findings point to a flaw in the business model behind apps, Jiang says. Developers rely on revenue from ad libraries to support free apps, but they have no control over what those libraries do. “The current model of embedding ad libraries in mobile apps for monetization purposes poses security and privacy risks. These ad libraries will essentially have the same set of permissions granted to the apps that enclose them. And certain ad libraries may abuse them for other unwanted purposes.”

Mobile device makers should provide ways to isolate the two, Jiang says, so that the ads run separately from the host apps—and require separate explicit permissions. “There are fundamental concerns in the way mobile apps are being monetized,” he adds.

Adding insult to injury, other research has recently found that ads associated with free Android apps are also battery-drainers. Abhinav Pathak, a computer scientist at Purdue University, and colleagues at Microsoft Research found that as much as three-quarters of the juice used by such apps is spent to serve ads and transmit user data back to advertisers.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

How scientists traced a mysterious covid case back to six toilets

When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.

The problem with plug-in hybrids? Their drivers.

Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.

It’s time to retire the term “user”

The proliferation of AI means we need a new word.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.