SneakLeak: Detecting multipartite leakage paths in Android apps

被引:6
|
作者
Bhandari, Shweta [1 ]
Herbreteau, Frederic [2 ]
Laxmi, Vijay [1 ]
Zemmari, Akka [2 ]
Roop, Partha S. [3 ]
Gaur, Manoj Singh [1 ]
机构
[1] Malaviya Natl Inst Technol Jaipur, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
[2] Univ Bordeaux, CNRS, LaBRI, F-33405 Talence, France
[3] Univ Auckland, Dept Elect & Comp Engn, Auckland, New Zealand
关键词
App Collusion; Multi-app Analysis; Verification; Model checking; Information Leakage; Permission Escalation;
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.249
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a technique is proposed to address the threat emerging from multiple colluding Android applications (apps). Existing techniques have focused on single app analysis which may be defeated by scattering leakage-capable path segments across multiple apps. In such a scenario, individual app shall appear benign. Whereas, together with other conspiring apps, if present, can lead to information leakage. This threat is known as app collusion. Relay of private and sensitive information from one app to another is possible via multiple communication mechanisms provided by Android. In this paper, we present SneakLeak, a new model-checking based technique for detection of app collusion. The proposed method analyze multiple apps simultaneously. SneakLeak can identify any set of conspiring apps that might be involved in the collusion. To demonstrate the efficacy of our proposal, we experimented with Android apps exhibiting collusion through inter-app communication. The apps are taken from test dataset named DroidBench. Our experiments show that the technique can precisely detect the presence/absence of collusion among apps.
引用
收藏
页码:285 / 292
页数:8
相关论文
共 50 条
  • [41] iFixDataloss: A Tool for Detecting and Fixing Data Loss Issues in Android Apps
    Guo, Wunan
    Dong, Zhen
    Shen, Liwei
    Tian, Wei
    Su, Ting
    Peng, Xin
    PROCEEDINGS OF THE 31ST ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2022, 2022, : 785 - 788
  • [42] Detecting Wake Lock Leaks in Android Apps Using Machine Learning
    Khan, Muhammad Umair
    Lee, Scott Uk-Jin
    Abbas, Shanza
    Abbas, Asad
    Bashir, Ali Kashif
    IEEE ACCESS, 2021, 9 : 125753 - 125767
  • [43] DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis
    Fan, Ming
    Liu, Jun
    Wang, Wei
    Li, Haifei
    Tian, Zhenzhou
    Liu, Ting
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1772 - 1785
  • [44] UIS-Hunter: Detecting UI Design Smells in Android Apps
    Yang, Bo
    Xing, Zhenchang
    Xia, Xin
    Chen, Chunyang
    Ye, Deheng
    Li, Shanping
    2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), 2021, : 89 - 92
  • [45] TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps
    Cui, Huajun
    Meng, Guozhu
    Zhang, Yan
    Wang, Weiping
    Zhu, Dali
    Su, Ting
    Zhang, Xiaodong
    Li, Yuejun
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 541 - 556
  • [46] POSTER: Detecting Inter-App Information Leakage Paths
    Bhandari, Shweta
    Herbreteau, Frederic
    Laxmi, Vijay
    Zemmari, Akka
    Roop, Partha S.
    Gaur, Manoj Singh
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 908 - 910
  • [47] Detecting Permission Crashes of Android Apps using Crawling and Revoke Operation Injections
    Liu, Chien-Hung
    Liu, Chen-Tzung
    Li, Hsiu-Hao
    2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE WORKSHOPS (APSECW 2021), 2021, : 47 - 51
  • [48] Detecting and Defending against Inter-App Permission Leaks in Android Apps
    He, Yi
    Li, Qi
    2016 IEEE 35TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2016,
  • [49] Detecting Privacy Information Abuse by Android Apps from API Call Logs
    Ito, Katsutaka
    Hasegawa, Hirokazu
    Yamaguchi, Yukiko
    Shimada, Hajime
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 143 - 157
  • [50] Detecting over-claim permissions and recognising dangerous permission in Android apps
    Shah, Monika
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (1-2) : 204 - 218