1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
|
/*
* Copyright (C) 2010 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.example.android.apis.view;
import com.example.android.apis.R;
import android.app.Activity;
import android.app.AlertDialog;
import android.os.Bundle;
import android.view.Gravity;
import android.view.MotionEvent;
import android.view.View;
import android.view.View.OnClickListener;
import android.view.View.OnTouchListener;
import android.widget.Button;
import android.widget.Toast;
/**
* This activity demonstrates two different ways in which views can be made more secure to
* touch spoofing attacks by leveraging framework features.
*
* The activity presents 3 buttons that obtensibly perform a risky security critical
* function. Under ordinary circumstances, the user would never click on these buttons
* or would at least think long and hard about it. However, a carefully crafted toast can
* overlay the contents of the activity in such a way as to make the user believe the buttons
* are innocuous. Since the toast cannot receive input, the touches are passed down to the
* activity potentially yielding an effect other than what the user intended.
*
* To simulate the spoofing risk, this activity pops up a specially crafted overlay as
* a toast layed out so as to cover the buttons and part of the descriptive text.
* For the purposes of this demonstration, pretend that the overlay was actually popped
* up by a malicious application published by the International Cabal of Evil Penguins.
*
* The 3 buttons are set up as follows:
*
* 1. The "unsecured button" does not apply any touch filtering of any kind.
* When the toast appears, this button remains clickable as usual which creates an
* opportunity for spoofing to occur.
*
* 2. The "built-in secured button" leverages the android:filterTouchesWhenObscured view
* attribute to ask the framework to filter out touches when the window is obscured.
* When the toast appears, the button does not receive the touch and appears to be inoperable.
*
* 3. The "custom secured button" adds a touch listener to the button which intercepts the
* touch event and checks whether the window is obscured. If so, it warns the user and
* drops the touch event. This example is intended to demonstrate how a view can
* perform its own filtering and provide additional feedback by examining the {@MotionEvent}
* flags to determine whether the window is obscured. Here we use a touch listener but
* a custom view subclass could perform the filtering by overriding
* {@link View#onFilterTouchEventForSecurity(MotionEvent)}.
*
* Refer to the comments on {@View} for more information about view security.
*/
public class SecureView extends Activity {
private int mClickCount;
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.secure_view);
Button toastButton = (Button) findViewById(R.id.secure_view_toast_button);
toastButton.setOnClickListener(new OnClickListener() {
public void onClick(View v) {
showOverlay();
}
});
Button unsecureButton = (Button) findViewById(R.id.secure_view_unsecure_button);
setClickedAction(unsecureButton);
Button builtinSecureButton = (Button) findViewById(R.id.secure_view_builtin_secure_button);
setClickedAction(builtinSecureButton);
Button customSecureButton = (Button) findViewById(R.id.secure_view_custom_secure_button);
setClickedAction(customSecureButton);
setTouchFilter(customSecureButton);
}
private void showOverlay() {
// Generate a toast view with a special layout that will position itself right
// on top of this view's interesting widgets. Sneaky huh?
SecureViewOverlay overlay = (SecureViewOverlay)
getLayoutInflater().inflate(R.layout.secure_view_overlay, null);
overlay.setActivityToSpoof(this);
Toast toast = new Toast(getApplicationContext());
toast.setGravity(Gravity.FILL, 0, 0);
toast.setView(overlay);
toast.show();
}
private void setClickedAction(Button button) {
button.setOnClickListener(new OnClickListener() {
public void onClick(View v) {
String[] messages = getResources().getStringArray(R.array.secure_view_clicked);
String message = messages[mClickCount++ % messages.length];
new AlertDialog.Builder(SecureView.this)
.setTitle(R.string.secure_view_action_dialog_title)
.setMessage(message)
.setNeutralButton(getResources().getString(
R.string.secure_view_action_dialog_dismiss), null)
.show();
}
});
}
private void setTouchFilter(Button button) {
button.setOnTouchListener(new OnTouchListener() {
public boolean onTouch(View v, MotionEvent event) {
if ((event.getFlags() & MotionEvent.FLAG_WINDOW_IS_OBSCURED) != 0) {
if (event.getAction() == MotionEvent.ACTION_UP) {
new AlertDialog.Builder(SecureView.this)
.setTitle(R.string.secure_view_caught_dialog_title)
.setMessage(R.string.secure_view_caught_dialog_message)
.setNeutralButton(getResources().getString(
R.string.secure_view_caught_dialog_dismiss), null)
.show();
}
// Return true to prevent the button from processing the touch.
return true;
}
return false;
}
});
}
}
|