A Novel Hybrid Method to Analyze Security Vulnerabilities in Android Applications

被引:26
|
作者
Tang, Junwei [1 ]
Li, Ruixuan [1 ]
Wang, Kaipeng [1 ]
Gu, Xiwu [1 ]
Xu, Zhiyong [2 ,3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Suffolk Univ, Comp Sci Dept, Boston, MA 02101 USA
[3] Chinese Acad Sci, Shenzhen Inst Adv Technol, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
Android security; vulnerability analysis; static analysis; dynamic analysis; MALWARE; ATTACKS;
D O I
10.26599/TST.2019.9010067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a novel hybrid method to analyze the security vulnerabilities in Android applications. Our method combines static analysis, which consists of metadata and data flow analyses with dynamic analysis, which includes dynamic executable scripts and application program interface hooks. Our hybrid method can effectively analyze nine major categories of important security vulnerabilities in Android applications. We design dynamic executable scripts that record and perform manual operations to customize the execution path of the target application. Our dynamic executable scripts can replace most manual operations, simplify the analysis process, and further verify the corresponding security vulnerabilities. We successfully statically analyze 5547 malwares in Drebin and 10151 real-world applications. The average analysis time of each application in Drebin is 4.52 s, whereas it reaches 92.02s for real-word applications. Our system can detect all the labeled vulnerabilities among 56 labeled applications. Further dynamic verification shows that our static analysis accuracy approximates 95% for real-world applications. Experiments show that our dynamic analysis can effectively detect the vulnerability named input unverified, which is difficult to be detected by other methods. In addition, our dynamic analysis can be extended to detect more types of vulnerabilities.
引用
收藏
页码:589 / 603
页数:15
相关论文
共 50 条
  • [21] Security Vulnerabilities in Consumer IoT Applications
    Shakdher, Arjun
    Agrawal, Suyash
    Yang, Baijian
    2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 1 - 6
  • [22] Android Mobile Applications Vulnerabilities and Prevention Methods: A Review
    Abdullah, Hilmi
    Zeebaree, Subhi R. M.
    PROCEEDING OF 2021 2ND INFORMATION TECHNOLOGY TO ENHANCE E-LEARNING AND OTHER APPLICATION (IT-ELA 2021), 2021, : 148 - 153
  • [23] Detecting vulnerabilities in Android applications using event sequences
    Ratliff, Zachary B.
    Kuhn, D. Richard
    Ragsdale, Daniel J.
    2019 IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2019), 2019, : 159 - 166
  • [24] Research of discovering vulnerabilities of NFC applications on Android platform
    Wang, Zhi-Qiang
    Liu, Qi-Xu
    Zhang, Yu-Qing
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 117 - 123
  • [25] A Hybrid Method and Its Applications to Analyze the Low Frequency Oscillations
    Yang, D. C.
    Rehtanz, C.
    Li, Y.
    Yang, D. Y.
    2012 IEEE PES TRANSMISSION AND DISTRIBUTION CONFERENCE AND EXPOSITION (T&D), 2012,
  • [26] Hybrid Analysis Of Executables To Detect Security Vulnerabilities
    Kumar, Pranith D.
    Nema, Anchal
    Kumar, Rajeev
    ISEC 2009 - PROCEEDINGS OF THE 2ND INDIA SOFTWARE ENGINEERING CONFERENCE, 2009, : 141 - 142
  • [27] Security analysis of permission re-delegation vulnerabilities in Android apps
    Demissie, Biniam Fisseha
    Ceccato, Mariano
    Shar, Lwin Khin
    EMPIRICAL SOFTWARE ENGINEERING, 2020, 25 (06) : 5084 - 5136
  • [28] Security analysis of permission re-delegation vulnerabilities in Android apps
    Biniam Fisseha Demissie
    Mariano Ceccato
    Lwin Khin Shar
    Empirical Software Engineering, 2020, 25 : 5084 - 5136
  • [29] TipTracer: Detecting Android Application Vulnerabilities Based on the Compliance with Security Guidance
    Zhang L.
    Yang Z.
    Li M.
    Yang M.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (11): : 2315 - 2329
  • [30] Analysis of Android Inter-App Security Vulnerabilities Using COVERT
    Sadeghi, Alireza
    Bagheri, Hamid
    Malek, Sam
    2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, 2015, : 725 - 728