APSET, an Android aPplication SEcurity Testing tool for detecting intent-based vulnerabilities

被引:0
|
作者
Sébastien Salva
Stassia R. Zafimiharisoa
机构
[1] University of Auvergne,LIMOS
[2] Blaise Pascal University,UMR CNRS 6158
关键词
Security testing; Model-based testing; Android applications; Intent mechanism;
D O I
暂无
中图分类号
学科分类号
摘要
The Android messaging system, called intent, is a mechanism that ties components together to build applications for smartphones. Intents are kinds of messages composed of actions and data, sent by a component to another component to perform several operations, e.g. launching a user interface. The intent mechanism offers a lot of flexibility for developing Android applications, but it might also be used as an entry point for security attacks. The latter can be easily sent with intents to components, that can indirectly forward attacks to other components and so on. In this context, this paper proposes APSET, a tool for Android aPplication SEcurity Testing, which aims at detecting intent-based vulnerabilities. It takes as inputs Android applications and intent-based vulnerabilities formally expressed with models called vulnerability patterns. Then, and this is the originality of our approach, class diagrams and partial specifications are automatically generated from applications with algorithms reflecting some knowledge of the Android documentation. These partial specifications avoid false positives and refine the test result with special verdicts notifying that a component is not compliant to its specification. Furthermore, we propose a test case execution framework which supports the receipt of any exception, the detection of application crashes, and provides a final XML test report detailing the test case verdicts. The vulnerability detection effectiveness of APSET is evaluated with experimentations on randomly chosen Android applications of the Android Market.
引用
收藏
页码:201 / 221
页数:20
相关论文
共 50 条
  • [31] Research on Android Intent Security Detection Based on Machine Learning
    Lv Zhuo
    Guo Zhimin
    Chen Cen
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 569 - 574
  • [32] Intent Based Security Challenges in Android-An Analysis & Recommendation
    Sivakumar, Janaki
    Yassir, Ammar
    Saravanan, P.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (01): : 46 - 50
  • [33] Security Testing of Web Applications: A Search-Based Approach for Detecting SQL Injection Vulnerabilities
    Liu, Muyang
    Li, Ke
    Chen, Tao
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 417 - 418
  • [34] Intent Based Security Challenges in Android-An Analysis & Recommendation
    Sivakumar, Janaki
    Yassir, Ammar
    Saravanan, P.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (03): : 72 - 76
  • [35] Estimating Intent-based Covert Channel Bandwidth by Time Series Decomposition Analysis in Android Platform
    Wang, Jiunn-Chin
    Lee, Hahn-Ming
    Chen, Chin-Wei
    Jeng, Albert B.
    2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), 2017, : 31 - 36
  • [36] RTL-ConTest: Concolic Testing on RTL for Detecting Security Vulnerabilities
    Meng, Xingyu
    Kundu, Shamik
    Kanuparthi, Arun K.
    Basu, Kanad
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (03) : 466 - 477
  • [37] Intent-based networking and its application to optical networks [Invited Tutorial]
    Velasco, L.
    Barzegar, S.
    Tabatabaeimehr, F.
    Ruiz, M.
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2022, 14 (01) : A11 - A22
  • [38] Security Testing of Second Order Permission Re-delegation Vulnerabilities in Android Apps
    Demissie, Biniam Fisseha
    Ceccato, Mariano
    2020 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT, 2020, : 1 - 11
  • [39] RegionDroid: A Tool for Detecting Android Application Repackaging Based on Runtime UI Region Features
    Yue, Shengtao
    Sun, Qingwei
    Ma, Jun
    Tao, Xianping
    Xu, Chang
    Lu, Jian
    PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2018, : 323 - 333
  • [40] Security vulnerabilities in computer software testing technology and its application
    Lan, Jiang
    INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS 1 & 2, 2014, : 541 - 545