A novel hybrid method to analyze security vulnerabilities in Android applications

التفاصيل البيبلوغرافية
العنوان: A novel hybrid method to analyze security vulnerabilities in Android applications
المؤلفون: Junwei Tang, Ruixuan Li, Xiwu Gu, Kaipeng Wang, Zhiyong Xu
المصدر: Tsinghua Science and Technology. 25:589-603
بيانات النشر: Tsinghua University Press, 2020.
سنة النشر: 2020
مصطلحات موضوعية: Multidisciplinary, Application programming interface, Computer science, business.industry, 020206 networking & telecommunications, 02 engineering and technology, computer.file_format, Static analysis, computer.software_genre, Metadata, Data flow diagram, Scripting language, Vulnerability assessment, Embedded system, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Executable, Android (operating system), business, computer
الوصف: We propose a novel hybrid method to analyze the security vulnerabilities in Android applications. Our method combines static analysis, which consists of metadata and data flow analyses with dynamic analysis, which includes dynamic executable scripts and application program interface hooks. Our hybrid method can effectively analyze nine major categories of important security vulnerabilities in Android applications. We design dynamic executable scripts that record and perform manual operations to customize the execution path of the target application. Our dynamic executable scripts can replace most manual operations, simplify the analysis process, and further verify the corresponding security vulnerabilities. We successfully statically analyze 5547 malwares in Drebin and 10151 real-world applications. The average analysis time of each application in Drebin is 4.52 s, whereas it reaches 92.02 s for real-word applications. Our system can detect all the labeled vulnerabilities among 56 labeled applications. Further dynamic verification shows that our static analysis accuracy approximates 95% for real-world applications. Experiments show that our dynamic analysis can effectively detect the vulnerability named input unverified, which is difficult to be detected by other methods. In addition, our dynamic analysis can be extended to detect more types of vulnerabilities.
تدمد: 1007-0214
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::87ca35deac093afcfc7bf7110bfd240a
https://doi.org/10.26599/tst.2019.9010067
حقوق: OPEN
رقم الأكسشن: edsair.doi...........87ca35deac093afcfc7bf7110bfd240a
قاعدة البيانات: OpenAIRE