ties of branchless banking applications in developing
countries. In ICTD ’17.
Khadiranaikar, B., Zavarsky, P., and Malik, Y. (2017). Im-
proving android application security for intent based
attacks. In IEMCON 2017.
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T.,
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., and Savage, S. (2010). Experimental
security analysis of a modern automobile. In 2010
IEEE Symposium on Security and Privacy.
Lampson, B. W. (1973). A note on the confinement prob-
lem. Commun. ACM, 16(10):613–615.
Lin, Y.-C. (2018). Androbugs framework. https://github.c
om/AndroBugs/AndroBugs Framework.
LinkedIn Corporation (2018). Qark. https://github.com/lin
kedin/qark.
Mandal, A. K., Cortesi, A., Ferrara, P., Panarotto, F., and
Spoto, F. (2018). Vulnerability analysis of android
auto infotainment apps. In CF ’18. ACM.
Marforio, C., Ritzdorf, H., Francillon, A., and Capkun, S.
(2012). Analysis of the communication between col-
luding applications on modern smartphones. In AC-
SAC ’12.
Mazloom, S., Rezaeirad, M., Hunter, A., and McCoy, D.
(2016). A security analysis of an in-vehicle infotain-
ment and app platform. In WOOT.
Mercedes-Benz (2018). Mercedes-benz user experience:
Revolution in the cockpit. https://www.mercedes-
benz.com/en/mercedes-benz/innovation/mbux-
mercedes-benz-user-experience-revolution-in-the-
cockpit/.
Micinski, K., Phelps, P., and Foster, J. S. (2013). An empir-
ical study of location truncation on android. Weather,
2:21.
Miller, C. and Valasek, C. (2015). Remote exploitation of
an unaltered passenger vehicle. Black Hat USA, 2015.
MirrorLink (2009). Mirrorlink. https://mirrorlink.com/.
MITRE (2013). CVE-2013-4787. https://cve.mitre.org/cgi-
bin/cvename.cgi?name=CVE-2013-4787.
Nauman, M., Khan, S., and Zhang, X. (2010). Apex: ex-
tending android permission model and enforcement
with user-defined runtime constraints. In ASIACCS
’10.
Porter Felt, Chin, E., Hanna, S., Song, D., and Wagner,
D. A. (2011a). Android permissions demystified. In
ACM Conference on Computer and Communications
Security, pages 627–638. ACM.
Porter Felt, Egelman, S., Finifter, M., Akhawe, D., Wag-
ner, D., et al. (2012a). How to ask for permission. In
HotSec.
Porter Felt, Wang, H. J., Moshchuk, A., Hanna, S., and
Chin, E. (2011b). Permission re-delegation: Attacks
and defenses. In USENIX Security Symposium.
Porter Felt, A., Ha, E., Egelman, S., Haney, A., Chin,
E., and Wagner, D. A. (2012b). Android permis-
sions: user attention, comprehension, and behavior.
In SOUPS, page 3. ACM.
Razaghpanah, A., Niaki, A. A., Vallina-Rodriguez, N., Sun-
daresan, S., Amann, J., and Gill, P. (2017). Studying
tls usage in android apps. In CoNEXT ’17.
Renault–Nissan Alliance (2018). Renault-nissan-mitsubishi
and google join forces on next-generation infotain-
ment. https://www.alliance-2022.com/news/renault-
nissan-mitsubishi-and-google-join-forces-on-next-
generation-infotainment/.
Reyes, I., Wiesekera, P., Razaghpanah, A., Reardon, J.,
Vallina-Rodriguez, N., Egelman, S., and Kreibich, C.
(2017). ” is our children’s apps learning?” automati-
cally detecting coppa violations. In ConPro’17.
Saltzer, J. H. and Schroeder, M. D. (1975). The protection
of information in computer systems. Proceedings of
the IEEE, 63(9).
Schlegel, R., Zhang, K., Zhou, X.-y., Intwala, M., Kapadia,
A., and Wang, X. (2011). Soundcomber: A stealthy
and context-aware sound trojan for smartphones. In
NDSS ’11.
Singleton, M. (2018). Spotify is testing a driving mode fea-
ture. https://www.theverge.com/2017/7/7/15937284/
spotify-driving-mode-feature-testing.
Spotify (2018). Privacy policy. https://www.spotify.com/us
/legal/privacy-policy/.
Tencent Keen Security Lab (2018). New ve-
hicle security research by keenlab: Exper-
imental security assessment of bmw cars.
https://keenlab.tencent.com/en/2018/05/22/New-
CarHacking-Research-by-KeenLab-Experimental-
Security-Assessment-of-BMW-Cars/.
Volkswagen (2018). 2018 passat press kit. https://media.vw
.com/en-us/press-kits/2018-passat-press-kit.
Volvo Car Group (2018). Volvo cars to embed
google assistant, google play store and google
maps in next-generation infotainment system.
https://www.media.volvocars.com/global/en-
gb/media/pressreleases/228639/volvo-cars-to-
embed-google-assistant-google-play-store-and-
google-maps-in-next-generation-infotainme.
Warren, C. (2018). Radio fm. https://play.google.
com/store/apps/details?id=com.radio.fmradio&
hl=en&reviewId=gp%3AAOqpTOFWacIVZQ-
JHULA86lKu5ZYSNQdIjsM8e6Ph0aj2RWN2aVm
oFJFfmJhC91yQEErw6Z0Re3I0LF6k1V o Y.
APPENDIX
Table 3: List of attacks and their severity score, based on
CVSS v3 (FIRST.Org Inc., 2018).
Name CVSS v3 Vector Score
SoundBlast AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L 4.4
Fork bomb AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H 5.9
Intent storm AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H 5.9
Permissionless speed AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N 3.3
Permissionless exfiltration AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N 3.3
Covert channel AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N 3.3
On the Road with Third-party Apps: Security Analysis of an In-vehicle App Platform
75