Abstract
While providing a seamless user experience by enabling web access within the app, in-app browsers raise security concerns, particularly in certificate validation, which can leave users vulnerable to Man-In-The-Middle (MITM) or phishing attacks unless appropriately implemented. In this paper, we systematically evaluated the certificate validation mechanisms of in-app browsers, also known as WebView, focusing on how effectively they comply with X.509 certificate standards and support advanced certificate extensions related to revocation and Certificate Transparency (CT). To ensure reproducibility and enable platform-specific trust anchor control which is particularly challenging on Android 14 and later, we developed a unified framework called FAITH using physical devices for iOS and Android emulators. Using FAITH and 115 crafted certificate chains-including 87 non-compliant chains and 28 designed to test advanced certificate extensions-we tested 20 popular Android and iOS apps, as well as desktop and mobile browsers. Android WebView apps accepted 77.0% of non-compliant chains and all non-compliant intermediate CA certificate tests, significantly higher than mainstream browsers and iOS apps. We identified the root cause in Android WebView's reliance on the system-level certificate validation handler, which performs minimal checks and lacks support for extensions such as OCSP Must-Staple and Precertificate. Additionally, we found that cached intermediate CA certificates are reused during validation in Android WebView, which exposes the process to unintended bypass of certificate checks. To demonstrate its real-world impact, we constructed a detailed CA caching attack scenario, and disclosed it to responsible vendors including Google. The reported bug was subsequently acknowledged as a valid security vulnerability. Finally, we conclude by providing recommendations to improve WebView's certificate validation behavior.
| Original language | English |
|---|---|
| Title of host publication | CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security |
| Publisher | Association for Computing Machinery, Inc |
| Pages | 2997-3011 |
| Number of pages | 15 |
| ISBN (Electronic) | 9798400715259 |
| DOIs | |
| Publication status | Published - 2025 Nov 22 |
| Event | 32nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2025 - Taipei, Taiwan, Province of China Duration: 2025 Oct 13 → 2025 Oct 17 |
Publication series
| Name | CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security |
|---|
Conference
| Conference | 32nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2025 |
|---|---|
| Country/Territory | Taiwan, Province of China |
| City | Taipei |
| Period | 25/10/13 → 25/10/17 |
Bibliographical note
Publisher Copyright:© 2025 Copyright held by the owner/author(s).
Keywords
- Certificate Validation
- In-app Browser
- WebView Security
ASJC Scopus subject areas
- Software
- Computer Networks and Communications
- Computer Science Applications
Fingerprint
Dive into the research topics of 'Deep Dive into In-app Browsers: Uncovering Hidden Pitfalls in Certificate Validation'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS