Reconstruction of Task Lists from Android Applications

被引:0
|
作者
Cui, Xingmin [1 ]
He, Ruiyi [1 ]
Hui, Lucas C. K. [1 ]
Yiu, S. M. [1 ]
Zhou, Gang [2 ]
Wang, Eric Ke [3 ]
机构
[1] Univ Hong Kong, Dept Comp Sci, Pokfulam, Hong Kong, Peoples R China
[2] Peking Univ, Beijing, Peoples R China
[3] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Android applications; Task; Program analysis;
D O I
10.1007/978-981-10-4154-9_46
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The popularity of Android devices has made Android apps attractive targets for attackers. Some static checkers have been proposed to check whether an Android app is vulnerable to privacy leakage and other attacks. However, these checkers model the control flows in the app following the ICC events, ignoring the intrinsic purpose of users' interaction with mobile devices. In fact, users carry out various tasks using mobile apps, e.g. online shopping. An Android task consists of one or more Activities, which are organized in the back stack of the task. By extracting the task lists among Activities in Android apps, we can capture all control flow transitions between them, including those bring by ICC events and back button events. We design and implement a system, which leverages the combination of static and dynamic analysis to extract the task lists. Our system can be used to detect task related attacks and help static checkers construct more complete call graphs.
引用
收藏
页码:396 / 403
页数:8
相关论文
共 50 条
  • [31] Correction to: Effective signal reconstruction from multiple ranked lists via convex optimization
    Michael G. Schimek
    Luca Vitale
    Bastian Pfeifer
    Michele La Rocca
    Data Mining and Knowledge Discovery, 2024, 38 : 1170 - 1170
  • [33] Towards Discovering and Understanding Task Hijacking in Android
    Ren, Chuangang
    Zhang, Yulong
    Xue, Hui
    Wei, Tao
    Liu, Peng
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 945 - 959
  • [34] Task Migration of JADE Agents on Android Platform
    Vyroubal, Vedran
    Kusek, Mario
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (CONTEL 2013), 2013, : 123 - 130
  • [35] Mobile phone app from NHS "hack day" is set to transform handovers and task lists
    Kmietowicz, Zosia
    BRITISH MEDICAL JOURNAL, 2012, 345
  • [36] Using ancestral state reconstruction methods for onomasiological reconstruction in multilingual word lists
    Jaeger, Gerhard
    List, Johann-Mattis
    LANGUAGE DYNAMICS AND CHANGE, 2018, 8 (01) : 22 - 54
  • [37] Android Applications Scanning: The Guide
    Almomani, Iman
    Khayer, Aala
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 357 - 361
  • [38] Certificate Reuse in Android Applications
    Nezhadian, Fatemeh
    Branca, Enrico
    Stakhanova, Natalia
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 226 - 245
  • [39] Certificate Pinning for Android Applications
    Bhor, Mahesh
    Karia, Deepak
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 527 - 530
  • [40] Defending Android Applications Availability
    Schmeelk, Suzanna
    Aho, Alfred
    2017 IEEE 28TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC), 2017,