A Novel Hybrid Method to Analyze Security Vulnerabilities in Android Applications

被引:26
|
作者
Tang, Junwei [1 ]
Li, Ruixuan [1 ]
Wang, Kaipeng [1 ]
Gu, Xiwu [1 ]
Xu, Zhiyong [2 ,3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Suffolk Univ, Comp Sci Dept, Boston, MA 02101 USA
[3] Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
Android security; vulnerability analysis; static analysis; dynamic analysis; MALWARE; ATTACKS;
D O I
10.26599/TST.2019.9010067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a novel hybrid method to analyze the security vulnerabilities in Android applications. Our method combines static analysis, which consists of metadata and data flow analyses with dynamic analysis, which includes dynamic executable scripts and application program interface hooks. Our hybrid method can effectively analyze nine major categories of important security vulnerabilities in Android applications. We design dynamic executable scripts that record and perform manual operations to customize the execution path of the target application. Our dynamic executable scripts can replace most manual operations, simplify the analysis process, and further verify the corresponding security vulnerabilities. We successfully statically analyze 5547 malwares in Drebin and 10151 real-world applications. The average analysis time of each application in Drebin is 4.52 s, whereas it reaches 92.02s for real-word applications. Our system can detect all the labeled vulnerabilities among 56 labeled applications. Further dynamic verification shows that our static analysis accuracy approximates 95% for real-world applications. Experiments show that our dynamic analysis can effectively detect the vulnerability named input unverified, which is difficult to be detected by other methods. In addition, our dynamic analysis can be extended to detect more types of vulnerabilities.
引用
收藏
页码:589 / 603
页数:15
相关论文
共 50 条
  • [1] A Novel Hybrid Method to Analyze Security Vulnerabilities in Android Applications
    Junwei Tang
    Ruixuan Li
    Kaipeng Wang
    Xiwu Gu
    Zhiyong Xu
    TsinghuaScienceandTechnology, 2020, 25 (05) : 589 - 603
  • [2] SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method
    Tang, Junwei
    Li, Jingjing
    Li, Ruixuan
    Han, Hongmu
    Gu, Xiwu
    Xu, Zhiyong
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [3] Android Vulnerabilities and Security
    Yadav, Saurav
    Apurva, Aviral
    Ranakoti, Pranshu
    Tomer, Shashank
    Roy, Nihar Ranjan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
  • [4] A Survey Paper on Vulnerabilities in Android OS and Security of Android Devices
    Meshram, P. D.
    Thool, R. C.
    2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 174 - 178
  • [5] A New Method to Analyze Graphical User Interfaces of Android Applications
    Hong Anh Le
    Ninh Thuan Truong
    CONTEXT-AWARE SYSTEMS AND APPLICATIONS (ICCASA 2016), 2017, 193 : 111 - 120
  • [6] A Survey of Security Vulnerabilities in Android Automotive Apps
    Moiz, Abdul
    Alalfi, Manar H.
    3RD INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2022), 2022, : 17 - 24
  • [7] A Study of Android Security Vulnerabilities and Their Future Prospects
    Alsumayt, Albandari
    Elbeh, Heba
    Elkawkagy, Mohamed
    Alfawaer, Zeyad
    Alghamedy, Fatemah H.
    Alshammari, Majid
    Aljameel, Sumayh S.
    Albassam, Sarah
    Alghareeb, Shahad
    Alamoudi, Khadijah
    HighTech and Innovation Journal, 2024, 5 (03): : 854 - 869
  • [8] Unveiling the Security Vulnerabilities in Android Operating System
    Renjith, G.
    Aji, S.
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 89 - 100
  • [9] Colluded Applications Vulnerabilities in Android Devices
    Khokhlov, Igor
    Reznik, Leon
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 462 - 469
  • [10] ActivityFuzzer: Detecting the Security Vulnerabilities of Android Activity Components
    Wang, Yongke
    Zhuge, Jianwei
    Sun, Donghong
    Liu, Wu
    Li, Fenghua
    2ND INTERNATIONAL CONFERENCE ON SIMULATION AND MODELING METHODOLOGIES, TECHNOLOGIES AND APPLICATIONS (SMTA 2015), 2015, : 262 - 267