Reconstruction of Task Lists from Android Applications

被引:0
|
作者
Cui, Xingmin [1 ]
He, Ruiyi [1 ]
Hui, Lucas C. K. [1 ]
Yiu, S. M. [1 ]
Zhou, Gang [2 ]
Wang, Eric Ke [3 ]
机构
[1] Univ Hong Kong, Dept Comp Sci, Pokfulam, Hong Kong, Peoples R China
[2] Peking Univ, Beijing, Peoples R China
[3] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Android applications; Task; Program analysis;
D O I
10.1007/978-981-10-4154-9_46
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The popularity of Android devices has made Android apps attractive targets for attackers. Some static checkers have been proposed to check whether an Android app is vulnerable to privacy leakage and other attacks. However, these checkers model the control flows in the app following the ICC events, ignoring the intrinsic purpose of users' interaction with mobile devices. In fact, users carry out various tasks using mobile apps, e.g. online shopping. An Android task consists of one or more Activities, which are organized in the back stack of the task. By extracting the task lists among Activities in Android apps, we can capture all control flow transitions between them, including those bring by ICC events and back button events. We design and implement a system, which leverages the combination of static and dynamic analysis to extract the task lists. Our system can be used to detect task related attacks and help static checkers construct more complete call graphs.
引用
收藏
页码:396 / 403
页数:8
相关论文
共 50 条
  • [1] Recovering Android Bad Smells from Android Applications
    Ghulam Rasool
    Azhar Ali
    Arabian Journal for Science and Engineering, 2020, 45 : 3289 - 3315
  • [2] Recovering Android Bad Smells from Android Applications
    Rasool, Ghulam
    Ali, Azhar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3289 - 3315
  • [3] Exploring Syscall-Based Semantics Reconstruction of Android Applications
    Nisi, Dario
    Bianchi, Antonio
    Fratantonio, Yanick
    PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 517 - 531
  • [4] Refactoring Android Source Code Smells From Android Applications
    Fawad, Muhammad
    Rasool, Ghulam
    Riaz, Muhammad Bilal
    IEEE ACCESS, 2025, 13 : 14122 - 14150
  • [5] Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction
    Song, Shiwen
    Liu, Xuanyu
    Fu, Xiao
    Luo, Bin
    Du, Xiaojiang
    Guizani, Mohsen
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [6] Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffic
    Li, Qun
    Zhang, Lei
    Hou, Shifeng
    Chen, Zhenxiang
    Han, Hongbo
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 487 - 496
  • [7] Android Market Reconstruction and Analysis
    Dering, Matthew L.
    McDaniel, Patrick
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 300 - 305
  • [8] Detection and Deterrence from Data Collecting Applications in Android
    Tiwari, Pradeep Kumar
    Velayutham, T.
    2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 326 - 331
  • [9] Detecting Malicious Android Applications from Runtime Behavior
    Lageman, Nathaniel
    Lindsey, Mark
    Glodek, William
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 324 - 329
  • [10] From Oligarchy to Republicanism: The Great Task of Reconstruction
    Volpe, Vernon L.
    JOURNAL OF AMERICAN HISTORY, 2018, 105 (03) : 689 - 689