Reconstruction of Task Lists from Android Applications

被引:0
|
作者
Cui, Xingmin [1 ]
He, Ruiyi [1 ]
Hui, Lucas C. K. [1 ]
Yiu, S. M. [1 ]
Zhou, Gang [2 ]
Wang, Eric Ke [3 ]
机构
[1] Univ Hong Kong, Dept Comp Sci, Pokfulam, Hong Kong, Peoples R China
[2] Peking Univ, Beijing, Peoples R China
[3] Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Android applications; Task; Program analysis;
D O I
10.1007/978-981-10-4154-9_46
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The popularity of Android devices has made Android apps attractive targets for attackers. Some static checkers have been proposed to check whether an Android app is vulnerable to privacy leakage and other attacks. However, these checkers model the control flows in the app following the ICC events, ignoring the intrinsic purpose of users' interaction with mobile devices. In fact, users carry out various tasks using mobile apps, e.g. online shopping. An Android task consists of one or more Activities, which are organized in the back stack of the task. By extracting the task lists among Activities in Android apps, we can capture all control flow transitions between them, including those bring by ICC events and back button events. We design and implement a system, which leverages the combination of static and dynamic analysis to extract the task lists. Our system can be used to detect task related attacks and help static checkers construct more complete call graphs.
引用
收藏
页码:396 / 403
页数:8
相关论文
共 50 条
  • [41] A New Protection for Android Applications
    Er-Rajy, Latifa
    El Kiram, My Ahmed
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2016, 3 (07): : 15 - 19
  • [42] Taming Exceptions in Android Applications
    Oliveira, Juliana
    2018 29TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2018, : 174 - 177
  • [43] A Type System for Android Applications
    El-Zawawy, Mohamed A.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2016, PT V, 2016, 9790 : 115 - 128
  • [44] An Operational Semantics for Android Applications
    El-Zawawy, Mohamed A.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2016, PT V, 2016, 9790 : 100 - 114
  • [45] String Analysis of Android Applications
    Del Vecchio, Justin
    Shen, Feng
    Yee, Kenny M.
    Wang, Boyu
    Ko, Steven Y.
    Ziarek, Lukasz
    2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2015, : 680 - 685
  • [46] Evaluating the Understandability of Android Applications
    Saifan, Ahmad A.
    Alsghaier, Hiba
    Alkhateeb, Khaled
    INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2018, 6 (01) : 44 - 57
  • [47] Estimate Risks Eate for Android Applications Using Android Permissions
    Er-Rajy, Latifa
    El Kiram, My Ahmed
    El Ghazouani, Mohamed
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2021, 12 (04)
  • [48] Statistical Deobfuscation of Android Applications
    Bichsel, Benjamin
    Raychev, Veselin
    Tsankov, Petar
    Vechev, Martin
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 343 - 355
  • [49] BehaviorDroid: Monitoring Android Applications
    Silva, Alexis
    Simmonds, Jocelyn
    2016 IEEE/ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2016), 2016, : 19 - 20
  • [50] Attacks on Android Banking Applications
    Kouraogo, Yacouba
    Zkik, Karim
    Noreddine, El Janati El Idrissi
    Orhanou, Ghizlane
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,