Highly Precise and Efficient Analysis of PendingIntent Vulnerabilities for Android Apps

被引:0
|
作者
Sarvazimi, Azadeh [1 ]
Sakhaei-Nia, Mehdi [1 ]
Bathaeian, Narges Sadat [1 ]
机构
[1] Department of Computer Engineering, Faculty of Engineering, Bu-Ali Sina University, Hamedan, Iran
关键词
Denial-of-service attack;
D O I
10.1155/2024/8663701
中图分类号
学科分类号
摘要
Te expanding development of android applications is partially due to the communication model, named inter-component communication (ICC) model. PendingIntent (PI) is a powerful feature that is used for ICC. Many android developers use PI in their apps, but if it is used insecurely, it can pose risks and result in diferent types of attacks like denial of service, privilege escalation, and data leakage. Hence, it is crucial to detect vulnerabilities related to PI before android apps are released on Android app stores. In this paper, a new PI-related vulnerability is introduced, which is detected by the proposed method in addition to the vulnerabilities pointed out in other methods. In addition, the proposed method that is based on static analysis takes less time than other methods to detect the vulnerabilities. For evaluation, we compare the proposed method with PIAnalyzer tool. Results on 51 application benchmarks show that the proposed method detects the new PI-related vulnerability that is not detected by PIAnalyzer. Also, the proposed method detects vulnerabilities 27% faster than PIAnalyzer. © 2024 Azadeh Sarvazimi et al.
引用
收藏
相关论文
共 50 条
  • [21] Empirical Analysis of Android Apps Permissions
    Abu Bakar, Normi Sham Awang
    Mahmud, Iqram
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 406 - 411
  • [22] Artifacts for Dynamic Analysis of Android Apps
    Cai, Haipeng
    Ryder, Barbara G.
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, : 659 - 659
  • [23] Analysis of Malicious Behavior of Android Apps
    Singh, Pooja
    Tiwari, Pankaj
    Singh, Santosh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 215 - 220
  • [24] FORENSIC ANALYSIS OF ANDROID STEGANOGRAPHY APPS
    Chen, Wenhao
    Wang, Yangxiao
    Guan, Yong
    Newman, Jennifer
    Lin, Li
    Reinders, Stephanie
    ADVANCES IN DIGITAL FORENSICS XIV, 2018, 532 : 293 - 312
  • [25] Towards Mutation Analysis of Android Apps
    Deng, Lin
    Mirzaei, Nariman
    Ammann, Paul
    Offutt, Jeff
    2015 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), 2015,
  • [26] Accelerating Symbolic Analysis for Android Apps
    Yang, Mingyue
    Lie, David
    Papernot, Nicolas
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2021), 2021, : 47 - 52
  • [27] NIVAnalyzer: a Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps
    Tang, Junjie
    Cui, Xingmin
    Zhao, Ziming
    Guo, Shanqing
    Xu, Xinshun
    Hu, Chengyu
    Ban, Tao
    Mao, Bing
    2017 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2017, : 492 - 499
  • [28] Security Testing of Second Order Permission Re-delegation Vulnerabilities in Android Apps
    Demissie, Biniam Fisseha
    Ceccato, Mariano
    2020 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT, 2020, : 1 - 11
  • [29] Flair: efficient analysis of Android inter-component vulnerabilities in response to incremental changes
    Bagheri, Hamid
    Wang, Jianghao
    Aerts, Jarod
    Ghorbani, Negar
    Malek, Sam
    EMPIRICAL SOFTWARE ENGINEERING, 2021, 26 (03)
  • [30] Flair: efficient analysis of Android inter-component vulnerabilities in response to incremental changes
    Hamid Bagheri
    Jianghao Wang
    Jarod Aerts
    Negar Ghorbani
    Sam Malek
    Empirical Software Engineering, 2021, 26