Assessing the Security and Privacy of Android Official ID Wallet Apps
Abstract
:1. Introduction
- We present an overview of the existing official mobile apps supporting IDs and DLs, as well as the privacy and security risks associated with storing digital ID and DL documents. The term “official” means apps that are either offered by governmental agencies (state-sponsored) or by a mobile operating system (OS), say, Android or iOS.
- We collect and analyze existing Android apps for ID and DL storage using three .apk analysis tools, present the discovered vulnerabilities of each app, and discuss key findings.
- We offer recommendations for app developers and relevant stakeholders to enhance the privacy and security of ID and DL storage in Android apps.
2. Related Work
3. ID/DL Wallet Apps Worldwide
4. Vulnerability Analysis
- Configuration checks for insecure settings. These settings include Android native parameters, e.g., in the AndroidManifest.xml.
- Third-party dependency analysis to find all application dependencies of all supported frameworks, as well as statically compiled dependencies, and identify a large set of libraries. The tool then tries to match these libraries against its known vulnerabilities database.
- Hardcoded secrets scanning, i.e., API keys, passwords, tokens, encryption keys, and initialization vectors (IVs).
- Taint analysis to identify vulnerabilities, such as SQL injection, command injection, or the use of hardcoded keys.
- severity high—subtracting 15 from the score;
- severity warning—subtracting 10 from the score;
- severity good—adding 5 to the score.
5. Discussion
5.1. Ostorlab
5.2. MobSF
- Crash reporters: These trackers notify developers upon a crash event, informing them about the respective error.
- Analytics trackers: Collect usage information, e.g., time users spent on the app and top features used.
- Profiling trackers: Attempt to profile users with the purpose of optimizing personalized advertising.
- Identification trackers: Gather information with the purpose of ultimately matching a digital (user) identity with the real person.
- Ads: These trackers focus on serving personalized advertisements to the users.
- Location trackers: By using location services, these trackers obtain the geographical location of the user to improve location-based personalized advertisements.
5.3. Androtomist
5.4. Key Takeaways
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
APK | Android application package |
CVE | Common vulnerabilities and exposures |
CWE | Common weakness enumeration |
DL | Driver’s license |
ID | Identity document |
IoT | Internet of things |
IV | Initialization vectors |
JSSEC | Japan smartphone security association |
OWASP | Open worldwide application security project |
SQL | Structured query language |
References
- European Commission. European Digital Identity. Available online: https://commission.europa.eu/strategy-and-policy/priorities-2019-2024/europe-fit-digital-age/european-digital-identity_en (accessed on 4 July 2023).
- European Commission. Road Safety: Commission Proposes Updated Requirements for Driving Licences and Better Cross-Border Enforcement of Road Traffic Rules. Available online: https://ec.europa.eu/commission/presscorner/detail/en/ip_23_1145 (accessed on 4 July 2023).
- Transportation Security Administration. When Will the Phased Digital ID Rollout Start? Which Airports/States Will Be First in Line for This New Technology? Available online: https://www.tsa.gov/travel/frequently-asked-questions/when-will-phased-digital-id-rollout-start-which-airportsstates (accessed on 4 July 2023).
- GLOBE NEWSWIRE. Study: More than Half of the World’s Population Will Use Mobile Wallets by 2025. Available online: https://www.globenewswire.com/en/news-release/2021/07/08/2259605/0/en/Study-More-than-half-of-the-world-s-population-will-use-mobile-wallets-by-2025.html (accessed on 4 July 2023).
- Damopoulos, D.; Kambourakis, G.; Anagnostopoulos, M.; Gritzalis, S.; Park, J.H. User privacy and modern mobile services: Are they on the same path? Pers. Ubiquitous Comput. 2013, 17, 1437–1448. [Google Scholar] [CrossRef]
- Papamartzivanos, D.; Damopoulos, D.; Kambourakis, G. A cloud-based architecture to crowdsource mobile app privacy leaks. In Proceedings of the 18th Panhellenic Conference on Informatics, PCI ’14, Athens, Greece, 2–4 October 2014; ACM: New York, NY, USA, 2014; pp. 59:1–59:6. [Google Scholar] [CrossRef]
- Papageorgiou, A.; Strigkos, M.; Politou, E.; Alepis, E.; Solanas, A.; Patsakis, C. Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice. IEEE Access 2018, 6, 9390–9403. [Google Scholar] [CrossRef]
- Kouliaridis, V.; Kambourakis, G.; Chatzoglou, E.; Geneiatakis, D.; Wang, H. Dissecting contact tracing apps in the Android platform. PLoS ONE 2021, 16, 1–28. [Google Scholar] [CrossRef]
- Karopoulos, G.; Hernandez-Ramos, J.L.; Kouliaridis, V.; Kambourakis, G. A Survey on Digital Certificates Approaches for the COVID-19 Pandemic. IEEE Access 2021, 9, 138003–138025. [Google Scholar] [CrossRef]
- Chatzoglou, E.; Kambourakis, G.; Kouliaridis, V. A Multi-Tier Security Analysis of Official Car Management Apps for Android. Future Internet 2021, 13, 58. [Google Scholar] [CrossRef]
- Louisiana Man Uses Digital Driver’s License to Defraud Credit Unions & Banks. Available online: https://www.cutimes.com/2023/03/16/louisiana-man-uses-digital-drivers-license-to-defraud-credit-unions-banks/?slreturn=20230708061731 (accessed on 4 July 2023).
- A Guide to Identity Theft Statistics for 2023. Available online: https://www.mcafee.com/learn/a-guide-to-identity-theft-statistics/ (accessed on 4 July 2023).
- One in Five Europeans Have Experienced Identity Theft Fraud in the Last Two Years. Available online: https://finanso.se/one-in-five-europeans-have-experienced-identity-theft-fraud-in-the-last-two-years/ (accessed on 4 July 2023).
- Android. App Security Best Practices. Available online: https://developer.android.com/topic/security/best-practices (accessed on 4 July 2023).
- OWASP Mobile Top 10. Available online: https://owasp.org/www-project-mobile-top-10/ (accessed on 4 July 2023).
- jssec. Android Application Secure Design/Secure Coding Guidebook. Available online: https://www.jssec.org/dl/android_securecoding_en_20220117/index.html (accessed on 4 July 2023).
- Garg, S.; Baliyan, N. Comparative Analysis of Android and IOS from Security Viewpoint. Comput. Sci. Rev. 2021, 40, 100372. [Google Scholar] [CrossRef]
- Sarkar, A.; Goyal, A.; Hicks, D.; Sarkar, D.; Hazra, S. Android Application Development: A Brief Overview of Android Platforms and Evolution of Security Systems. In Proceedings of the 2019 Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 12–14 December 2019; pp. 73–79. [Google Scholar] [CrossRef]
- Filiol, E.; Irolla, P. Security of Mobile Banking… and of Other Mobile Apps. In Proceedings of the Black Hat Asia, Singapore, 24–27 March 2015; pp. 1–22. [Google Scholar]
- Kaur, R.; Li, Y.; Iqbal, J.; Gonzalez, H.; Stakhanova, N. A Security Assessment of HCE-NFC Enabled E-Wallet Banking Android Apps. In Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, 23–27 July 2018; Volume 02, pp. 492–497. [Google Scholar] [CrossRef]
- Mandal, A.K.; Cortesi, A.; Ferrara, P.; Panarotto, F.; Spoto, F. Vulnerability analysis of android auto infotainment apps. In Proceedings of the 15th ACM International Conference on Computing Frontiers, Ischia, Italy, 8–10 May 2018; pp. 183–190. [Google Scholar]
- Egele, M.; Brumley, D.; Fratantonio, Y.; Kruegel, C. An Empirical Study of Cryptographic Misuse in Android Applications. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, 4–8 November 2013; Association for Computing Machinery: New York, NY, USA, 2013; pp. 73–84. [Google Scholar] [CrossRef] [Green Version]
- Chatzikonstantinou, A.; Ntantogian, C.; Karopoulos, G.; Xenakis, C. Evaluation of Cryptography Usage in Android Applications. EAI Endorsed Trans. Secur. Saf. 2016, 3, e4. [Google Scholar] [CrossRef] [Green Version]
- Chatzoglou, E.; Kambourakis, G.; Smiliotopoulos, C. Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny. Sensors 2022, 22, 513. [Google Scholar] [CrossRef] [PubMed]
- Muñoz, A.; Ríos, R.; Román, R.; López, J. A survey on the (in)security of trusted execution environments. Comput. Secur. 2023, 129, 103180. [Google Scholar] [CrossRef]
- Gómez, A.; Muñoz, A. Deep Learning-Based Attack Detection and Classification in Android Devices. Electronics 2023, 12, 3253. [Google Scholar] [CrossRef]
- Statista. Mobile Operating Systems’ Market Share Worldwide from 1st Quarter 2009 to 4th Quarter 2022. Available online: https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/ (accessed on 4 July 2023).
- Statcounter. Mobile Operating System Market Share Worldwide. Available online: https://gs.statcounter.com/os-market-share/mobile/worldwide (accessed on 4 July 2023).
- Google Inc. What’s New in Google System Updates. Available online: https://support.google.com/product-documentation/answer/11412553 (accessed on 4 July 2023).
- Apple Inc. Apple Announces First States Signed Up to Adopt Driver’s Licenses and State IDs in Apple Wallet. Available online: https://www.apple.com/newsroom/2021/09/apple-announces-first-states-to-adopt-drivers-licenses-and-state-ids-in-wallet/ (accessed on 4 July 2023).
- Lawallet App. Available online: https://play.google.com/store/apps/details?id=gov.la.omv.lawallet (accessed on 4 July 2023).
- MyColorado App. Available online: https://play.google.com/store/apps/details?id=com.soc.mycolorado (accessed on 4 July 2023).
- FL Smart ID App. Available online: https://play.google.com/store/apps/details?id=com.thalesgroup.dis.idv.fl.holder.prd (accessed on 4 July 2023).
- dds2go App. Available online: https://play.google.com/store/apps/details?id=gov.ga.dds.gadds (accessed on 4 July 2023).
- Oklahoma Mobile ID App. Available online: https://play.google.com/store/apps/details?id=com.idemia.mobileid.us.ok (accessed on 4 July 2023).
- Delaware Mobile ID App. Available online: https://play.google.com/store/apps/details?id=com.idemia.mobileid.us.de (accessed on 4 July 2023).
- GET Mobile ID. Available online: https://play.google.com/store/apps/details?id=com.getgroupna.mdl.app.utah (accessed on 4 July 2023).
- Airside Digital Identity. Available online: https://play.google.com/store/apps/details?id=com.airsidemobile.digitalid.android.prod (accessed on 4 July 2023).
- eID-Me Digital ID App. Available online: https://play.google.com/store/apps/details?id=ca.bluink.eid_me_and (accessed on 4 July 2023).
- eAusweise App. Available online: https://play.google.com/store/apps/details?id=at.gv.oe.awp.eausweise (accessed on 4 July 2023).
- Kørekort App. Available online: https://play.google.com/store/apps/details?id=dk.digst.mdl (accessed on 4 July 2023).
- Verimi ID Wallet App. Available online: https://play.google.com/store/apps/details?id=com.verimi (accessed on 4 July 2023).
- gov.gr App. Available online: https://play.google.com/store/apps/details?id=gr.gov.wallet (accessed on 4 July 2023).
- Kopie ID App. Available online: https://play.google.com/store/apps/details?id=com.milvum.kopieid (accessed on 4 July 2023).
- id.gov.pt App. Available online: https://play.google.com/store/apps/details?id=id.gov.pt (accessed on 4 July 2023).
- mi DGT App. Available online: https://play.google.com/store/apps/details?id=com.dgt.midgt&hl=en (accessed on 4 July 2023).
- RTA m-Wallet App. Available online: https://play.google.com/store/apps/details?id=tsgovt.com.mywalet (accessed on 4 July 2023).
- Service NSW App. Available online: https://play.google.com/store/apps/details?id=au.gov.nsw.service (accessed on 4 July 2023).
- Ostorlab. Mobile Application Security Testing. Available online: https://www.ostorlab.co/product/mobile (accessed on 4 July 2023).
- Abraham, A.; Schlecht, D.; Dobrushin, M.; Nadal, V. Mobile security framework (MobSF). Available online: https://github.com/MobSF/Mobile-Security-Framework-MobSF (accessed on 4 July 2023).
- Kouliaridis, V.; Kambourakis, G.; Geneiatakis, D.; Potha, N. Two Anatomists Are Better than One-Dual-Level Android Malware Detection. Symmetry 2020, 12, 1128. [Google Scholar] [CrossRef]
- Android Official ID Wallet Apps–Analysis Results. Available online: https://github.com/billkoul/AndroidIDWalletApps (accessed on 4 July 2023).
- OWASP Mobile App Security. Available online: https://owasp.org/www-project-mobile-app-security/ (accessed on 4 July 2023).
- Task Hijacking. Available online: https://docs.ostorlab.co/kb/APK_TASK_HIJACKING/ (accessed on 4 July 2023).
- Handle Affinities. Available online: https://developer.android.com/guide/components/activities/tasks-and-back-stack#Affinities (accessed on 4 July 2023).
- Intent Spoofing. Available online: https://docs.ostorlab.co/kb/INTENT_SPOOFING/ (accessed on 4 July 2023).
- CVE-2017-13156. Available online: https://nvd.nist.gov/vuln/detail/CVE-2017-13156 (accessed on 4 July 2023).
- CWE-532: Insertion of Sensitive Information into Log File. Available online: https://cwe.mitre.org/data/definitions/532.html (accessed on 4 July 2023).
- CWE-926: Improper Export of Android Application Components. Available online: https://cwe.mitre.org/data/definitions/926.html (accessed on 4 July 2023).
- European Commission. Cybersecurity Policies. Available online: https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-policies (accessed on 4 July 2023).
Country/State | App Name | ID | DL | Downloads | Android Version | App Providers |
---|---|---|---|---|---|---|
North America | ||||||
Louisiana, USA | LA wallet [31] | Yes | Yes | 500 K | 5.0+ | State of Louisiana |
Colorado, USA | myColorado [32] | Yes | No | 100 K | 8.1+ | State of Colorado—Governor’s Office of IT |
Florida, USA | FL Smart ID: Thales [33] | No | Yes | 10 K | 6.0+ | Florida Department of Highway Safety and Motor Vehicles |
Georgia, USA | DDS 2 GO [34] | No | Yes | 500 K | 5.1+ | Georgia Department of Driver Services |
Oklahoma, USA | Oklahoma Mobile ID [35] | Yes | No | 100 K | 6.0+ | Idemia R&D |
Delaware, USA | Delaware Mobile ID [36] | Yes | No | 10 K | 6.0+ | Idemia R&D |
Utah, USA | GET Mobile ID [37] | Yes | Yes | 10 K | 8.0+ | GET Group NA |
USA | Airside Digital Identity [38] | Yes | Yes | 10 K | 8.0+ | American Airlines/Airside Mobile Inc. |
Canada | eID-Me Digital ID [39] | Yes | No | 10 K | 8.0+ | Bluink Ltd. |
Europe | ||||||
Austria | eAusweise [40] | No | Yes | 100 K | 8.0+ | Bundesministerium für Finanzen |
Denmark | Kørekort [41] | No | Yes | 500 K | 8.0+ | Digitaliseringsstyrelsen |
Germany | Verimi ID wallet [42] | Yes | Yes | 100 K | 7.0+ | Verimi |
Greece | Gov.gr Wallet [43] | Yes | Yes | 500 K | 8.0+ | Hellenic Republic |
Netherlands | KopieID [44] | Yes | No | 1 M | 7.0+ | Rijksoverheid |
Portugal | id.gov.pt [45] | Yes | Yes | 500 K | 4.2+ | AMA, IP |
Spain | mi DGT [46] | No | Yes | 5 M | 5.1+ | DGT oficial |
Asia | ||||||
Telangana, India | RTA m-wallet [47] | No | Yes | 5 K | 5.0+ | Transport Department Govt. of Telangana |
Oceania | ||||||
Australia | Service NSW [48] | No | Yes | 1 M | 6.0+ | Service NSW |
App Name | Ostorlab Risk Rating | MobSF Security Score (%) | Exported Activities-Services-Receivers |
---|---|---|---|
LA wallet | High | Medium (45) | 1-4-1 |
myColorado | High | Medium (53) | 1-0-1 |
FL Smart ID: Thales | High | Medium (57) | 1-1-1 |
DDS 2 GO | Medium | Low (38) | 2-1-1 |
Oklahoma Mobile ID | High | Medium (60) | 3-0-3 |
Delaware Mobile ID | High | Medium (55) | 3-0-2 |
GET Mobile ID | High | High (69) | 3-3-1 |
Airside Digital Identity | Low | Medium (62) | 2-2-2 |
eID-Me Digital ID | High | Medium (56) | 1-1-1 |
eAusweise | Low | Medium (60) | 6-0-1 |
Kørekort | Low | Medium (60) | 0-1-1 |
Verimi ID wallet | Medium | Medium (64) | 1-2-2 |
Gov.gr Wallet | High | Medium (56) | 2-2-2 |
KopieID | Low | Medium (62) | 1-0-0 |
id.gov.pt | High | Medium (51) | 1-0-1 |
mi DGT | High | Medium (51) | 7-1-2 |
RTA m-wallet | High | Medium (44) | 0-1-1 |
Service NSW | High | Medium (44) | 2-2-5 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kouliaridis, V.; Karopoulos, G.; Kambourakis, G. Assessing the Security and Privacy of Android Official ID Wallet Apps. Information 2023, 14, 457. https://doi.org/10.3390/info14080457
Kouliaridis V, Karopoulos G, Kambourakis G. Assessing the Security and Privacy of Android Official ID Wallet Apps. Information. 2023; 14(8):457. https://doi.org/10.3390/info14080457
Chicago/Turabian StyleKouliaridis, Vasileios, Georgios Karopoulos, and Georgios Kambourakis. 2023. "Assessing the Security and Privacy of Android Official ID Wallet Apps" Information 14, no. 8: 457. https://doi.org/10.3390/info14080457
APA StyleKouliaridis, V., Karopoulos, G., & Kambourakis, G. (2023). Assessing the Security and Privacy of Android Official ID Wallet Apps. Information, 14(8), 457. https://doi.org/10.3390/info14080457