Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Chat-App Decryption Key Extraction Through Information Flow Analysis

View through CrossRef
Recent years have seen a pervasive usage of mobile-based instant messaging apps, which are popularly known as chat apps. On users' mobile devices, chat logs are usually stored encrypted. This paper is concerned with discovering the decryption key of chat-log database files as they are used by popular chat apps like WhatsApp and WeChat. We propose a systematic and generalized information-flow based approach to recovering the decryption key by taking advantage of both static and dynamic analyses. We show that, despite the employed code obfuscation techniques, we can perform the key discovery process on relevant code portions. Furthermore, to the best of our knowledge, we are the first to detail the employed string de-obfuscation, encrypted database file structure, and decryption-key formulation of the latest WhatsApp with crypt12 database. We also demonstrate how our key-extraction techniques can decrypt encrypted WhatsApp and WeChat database files that originate from a target device. Additionally, we show how we can construct a version of WhatsApp or WeChat that simulates the key generation processes of a remote target device, and recover the keys. Lastly, we analyze why our technique can work on widely-popular chat apps, and mention measures that can be adopted by chat-app developers to better protect the privacy of billions of their users.
Title: Chat-App Decryption Key Extraction Through Information Flow Analysis
Description:
Recent years have seen a pervasive usage of mobile-based instant messaging apps, which are popularly known as chat apps.
On users' mobile devices, chat logs are usually stored encrypted.
This paper is concerned with discovering the decryption key of chat-log database files as they are used by popular chat apps like WhatsApp and WeChat.
We propose a systematic and generalized information-flow based approach to recovering the decryption key by taking advantage of both static and dynamic analyses.
We show that, despite the employed code obfuscation techniques, we can perform the key discovery process on relevant code portions.
Furthermore, to the best of our knowledge, we are the first to detail the employed string de-obfuscation, encrypted database file structure, and decryption-key formulation of the latest WhatsApp with crypt12 database.
We also demonstrate how our key-extraction techniques can decrypt encrypted WhatsApp and WeChat database files that originate from a target device.
Additionally, we show how we can construct a version of WhatsApp or WeChat that simulates the key generation processes of a remote target device, and recover the keys.
Lastly, we analyze why our technique can work on widely-popular chat apps, and mention measures that can be adopted by chat-app developers to better protect the privacy of billions of their users.

Related Results

Playing Pregnancy: The Ludification and Gamification of Expectant Motherhood in Smartphone Apps
Playing Pregnancy: The Ludification and Gamification of Expectant Motherhood in Smartphone Apps
IntroductionLike other forms of embodiment, pregnancy has increasingly become subject to representation and interpretation via digital technologies. Pregnancy and the unborn entity...
User Friendliness and Perioperative Guidance Benefits of a Cataract Surgery Education App: Randomized Controlled Trial
User Friendliness and Perioperative Guidance Benefits of a Cataract Surgery Education App: Randomized Controlled Trial
Background Cataract surgeries are among the most performed surgeries worldwide. A thorough patient education is essential to inform patients about the perioperative pro...

Back to Top