SoK: Hardening Techniques in the Mobile Ecosystem - Are We There Yet?

  • Magdalena Steinbock*
  • , Jens Troost
  • , Wilco Van Beijnum
  • , Jan Seredynski
  • , Herbert Bos
  • , Martina Lindorfer
  • , Andrea Continella
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

22 Downloads (Pure)

Abstract

Irrespective of the security and isolation guarantees offered by the mobile operating system, the Mobile Application Security Verification Standard (MASVS) recommends app developers to implement hardening techniques for self-protection - to prevent tampering and leakage, detect jailbreaks, etc. Despite regulations incentivize developers toward implementing self-protection, our understanding of the use of hardening techniques is still very limited - especially regarding differences, if any, between the two main mobile ecosystems. In this paper, we systematize knowledge on the use and analysis of hardening techniques, covering, for the first time, both Android and iOS apps.To this end, we present HALY, a framework to analyze the adoption of hardening techniques. Using HALY's static and dynamic analysis, we analyze 2,646 popular apps available on both Android and iOS, and measure the prevalence of hardening techniques. Contrary to expectation, apps on iOS underperform in self-protection, implementing only half of the recommended hardening techniques compared to their Android counterparts - challenging the long-held belief that iOS is simply 'more secure.' Equally surprising, while privacy-sensitive apps implement more self-protection, many apps implement hardening techniques on only one of the two OSes. Furthermore, as many common techniques are easy to individually bypass, the additional security is questionable. Overall, almost all apps implement some hardening techniques, but as many as 24.1% (Android) and 73.6% (iOS) implement fewer than half of the recommended ones, and we only found 26 apps on Android to implement all eight and only one app on iOS adopt all seven analyzed techniques.

Original languageEnglish
Title of host publicationProceedings - IEEE 10th European Symposium on Security and Privacy (Euro S&P) 2025
PublisherIEEE
Pages789-806
Number of pages18
ISBN (Electronic)9798331594930
DOIs
Publication statusPublished - 26 Aug 2025
Event10th IEEE European Symposium on Security and Privacy, Euro S&PW 2025 - Venice, Italy
Duration: 30 Jun 20254 Jul 2025
Conference number: 10

Conference

Conference10th IEEE European Symposium on Security and Privacy, Euro S&PW 2025
Abbreviated titleEuro S&P 2025
Country/TerritoryItaly
CityVenice
Period30/06/254/07/25

Keywords

  • android
  • app hardening
  • app self protection
  • dynamic analysis
  • ios
  • static analysis

Fingerprint

Dive into the research topics of 'SoK: Hardening Techniques in the Mobile Ecosystem - Are We There Yet?'. Together they form a unique fingerprint.

Cite this