Skip to content

TapTrap is a new attack on Android that lures you into performing actions you did not intend to do. This allows an app to silently access your camera or location, or even erase your entire device — all without your consent.

License

Notifications You must be signed in to change notification settings

beerphilipp/taptrap

Repository files navigation

TapTrap: Animation-Driven Tapjacking on Android

This repository contains the artifacts of the paper "TapTrap: Animation-Driven Tapjacking on Android", to be presented at USENIX 2025.

Paper Artifact Appendix Presentation Poster Website DOI

Abstract

Users interact with mobile devices under the assumption that the graphical user interface (GUI) accurately reflects their actions, a trust fundamental to the user experience. In this work, we present TapTrap, a novel attack that enables zeropermission apps to exploit UI animations to undermine this trust relationship. TapTrap can be used by a malicious app to stealthily bypass Android’s permission system and gain access to sensitive data or execute destructive actions, such as wiping the device without user approval. Its impact extends beyond the Android ecosystem, enabling tapjacking and Web clickjacking. TapTrap is able to bypass existing tapjacking defenses, as those are targeted toward overlays. Our novel approach, instead, abuses activity transition animations and is effective even on Android 15. We analyzed 99,705 apps from the Play Store to assess whether TapTrap is actively exploited in the wild. Our analysis found no evidence of such exploitation. Additionally, we conducted a large-scale study on these apps and discovered that 76.3% of apps are vulnerable to TapTrap. Finally, we evaluated the real-world feasibility of TapTrap through a user study with 20 participants, showing that all of them failed to notice at least one attack variant. Our findings have resulted in two assigned CVEs.

File structure

The repository is organized as follows:

Getting Started

To run a specific analysis pipeline, navigate to the corresponding folder (e.g., vulnerable_app_detection) and follow the steps in its README.md.

Note

We support Ubuntu 24.04 (x86) and macOS 15 (ARM and x86). While other Unix-based operating systems are expected to work out-of-the box, we do not guarantee it and adjustments may be necessary.

Reproducibility

To reproduce the experiments and results reported in the paper, please refer to reproducibility/README.md and follow the instructions provided in the Artifact Appendix.

Demonstration

This video demonstrates TapTrap. In the example, the user plays a game that secretly opens the browser and tricks them into granting camera permissions to a malicious website. The hidden screen is semi-transparent for demonstration purposes.

Watch demo video

CVEs

CVE

Note

Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform privilege escalation via a crafted app.

CVE

Note

Android apps can load web pages using the Custom Tabs feature. This feature supports a transition animation that could have been used to trick a user into granting sensitive permissions by hiding what the user was actually clicking. This vulnerability affects Firefox < 136.

Cite The Paper

To cite our work, please use the following BibTeX entry:

@inproceedings{taptrap_beer,
  author    = {Philipp Beer and Marco Squarcina and Sebastian Roth and Martina Lindorfer},
  title     = {{TapTrap: Animation-Driven Tapjacking on Android}},
  booktitle = {34th USENIX Security Symposium (USENIX Security 25)},
  year      = {2025},
  address   = {Seattle, WA},
  publisher = {USENIX Association},
  month     = aug
}

Contacts

You can find more information on our website https://taptrap.click.

License Notice

This repository is released under the MIT License. See LICENSE for details.

This project includes third-party software:

The paper includes icons released, among others, under the GPL and MIT licenses.

About

TapTrap is a new attack on Android that lures you into performing actions you did not intend to do. This allows an app to silently access your camera or location, or even erase your entire device — all without your consent.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published