Highly Precise and Efficient Analysis of PendingIntent Vulnerabilities for Android Apps

被引:0
|
作者
Sarvazimi, Azadeh [1 ]
Sakhaei-Nia, Mehdi [1 ]
Bathaeian, Narges Sadat [1 ]
机构
[1] Department of Computer Engineering, Faculty of Engineering, Bu-Ali Sina University, Hamedan, Iran
关键词
Denial-of-service attack;
D O I
10.1155/2024/8663701
中图分类号
学科分类号
摘要
Te expanding development of android applications is partially due to the communication model, named inter-component communication (ICC) model. PendingIntent (PI) is a powerful feature that is used for ICC. Many android developers use PI in their apps, but if it is used insecurely, it can pose risks and result in diferent types of attacks like denial of service, privilege escalation, and data leakage. Hence, it is crucial to detect vulnerabilities related to PI before android apps are released on Android app stores. In this paper, a new PI-related vulnerability is introduced, which is detected by the proposed method in addition to the vulnerabilities pointed out in other methods. In addition, the proposed method that is based on static analysis takes less time than other methods to detect the vulnerabilities. For evaluation, we compare the proposed method with PIAnalyzer tool. Results on 51 application benchmarks show that the proposed method detects the new PI-related vulnerability that is not detected by PIAnalyzer. Also, the proposed method detects vulnerabilities 27% faster than PIAnalyzer. © 2024 Azadeh Sarvazimi et al.
引用
收藏
相关论文
共 50 条
  • [1] PITracker: Detecting Android PendingIntent Vulnerabilities through Intent Flow Analysis
    Zhang, Chennan
    Li, Shuang
    Diao, Wenrui
    Guo, Shanqing
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, : 20 - 25
  • [2] sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps
    Gajrani, Jyoti
    Tripathi, Meenakshi
    Laxmi, Vijay
    Gaur, M. S.
    Conti, Mauro
    Rajarajan, Muttukrishnan
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 854 - 860
  • [3] Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis
    Cai, Haipeng
    Jenkins, John
    2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), 2018, : 265 - 269
  • [4] Obfuscating Code Vulnerabilities Against Static Analysis in Android Apps
    Pagano, Francesco
    Verderame, Luca
    Merlo, Alessio
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2024, 2024, 710 : 381 - 395
  • [5] EspyDroid plus : Precise reflection analysis of android apps
    Gajrani, Jyoti
    Agarwal, Umang
    Laxmi, Vijay
    Bezawada, Bruhadeshwar
    Gaur, Manoj Singh
    Tripathi, Meenakshi
    Zemmari, Akka
    COMPUTERS & SECURITY, 2020, 90 (90)
  • [6] A Survey of Security Vulnerabilities in Android Automotive Apps
    Moiz, Abdul
    Alalfi, Manar H.
    3RD INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2022), 2022, : 17 - 24
  • [7] Detection of SQLite Database Vulnerabilities in Android Apps
    Jain, Vineeta
    Gaur, M. S.
    Laxmi, Vijay
    Mosbah, Mohamed
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 521 - 531
  • [8] Security analysis of permission re-delegation vulnerabilities in Android apps
    Biniam Fisseha Demissie
    Mariano Ceccato
    Lwin Khin Shar
    Empirical Software Engineering, 2020, 25 : 5084 - 5136
  • [9] Security analysis of permission re-delegation vulnerabilities in Android apps
    Demissie, Biniam Fisseha
    Ceccato, Mariano
    Shar, Lwin Khin
    EMPIRICAL SOFTWARE ENGINEERING, 2020, 25 (06) : 5084 - 5136
  • [10] PlAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis
    Gross, Sascha
    Tiwari, Abhishek
    Hammer, Christian
    COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 41 - 59