A fine-grained approach for Android taint analysis based on labeled taint value graphs

被引:0
|
作者
Xiang, Dongming [1 ]
Lin, Shuai [1 ]
Huang, Ke [2 ]
Ding, Zuohua [1 ]
Liu, Guanjun [3 ,4 ]
Li, Xiaofeng [5 ,6 ]
机构
[1] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Hangzhou 310000, Zhejiang, Peoples R China
[2] Zhejiang Petr Comprehens Energy Sales Co Ltd, Jinhua 321013, Zhejiang, Peoples R China
[3] Tongji Univ, Key Lab Embedded Syst & Serv Comp, Dept Comp Sci, Minist Educ, Shanghai 200092, Peoples R China
[4] Tongji Univ, Shanghai Elect Transact & Informat Serv, Collaborat Innovat Ctr, Shanghai 200092, Peoples R China
[5] Beijing Inst Control Engn, Beijing 100094, Peoples R China
[6] Northwestern Polytech Univ, Sch Software, Xian 710129, Shanxi, Peoples R China
关键词
Static taint analysis; Android security; Vulnerability detection; Fine-grained analysis;
D O I
10.1016/j.cose.2024.104162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Static taint analysis is a widely used method to identify vulnerabilities in Android applications. However, the existing tools for static analysis often struggle with processing times, particularly when dealing with complex real-world programs. To reduce time consumption, some tools choose to sacrifice analytical precision, e.g., FastDroid sets an upper limit for analysis iterations in Android applications. In this paper, we propose a labeled taint value graph (LTVG) to store taint flows, and implement a fine-grained analysis tool called LabeledDroid. This graph is constructed based on the taint value graph (TVG) of FastDroid, and takes into account both precision and time consumption. That is, we decompile an Android app into Jimple statements, develop finegrained propagation rules to handle List, and construct LTVGs according to these rules. Afterwards, we traverse LTVGs to obtain high-precision taint flows. An analysis of 39 apps from the TaintBench benchmark shows that LabeledDroid is 0.87 s faster than FastDroid on average. Furthermore, if some common accuracy parameters are adapted in both LabeledDroid and FastDroid, the experiment demonstrates that the former is more scalable. Moreover, the maximum analysis time of LabeledDroid is less than 200 s and its average time is 46.25 s, while FastDroid sometimes experiences timeouts with durations longer than 600 s. Additionally, LabeledDroid achieves a precision of 70% in handling lists, while FastDroid and TaintSA achieve precisions of 38.9% and 41.2%, respectively.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Fine-grained Android Malware Detection based on Deep Learning
    Li, Dongfang
    Wang, Zhaoguo
    Xue, Yibo
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [22] LeakMiner: Detect information leakage on Android with static taint analysis
    Yang, ZheMin
    Yang, Min
    PROCEEDINGS OF THE 2012 THIRD WORLD CONGRESS ON SOFTWARE ENGINEERING (WCSE 2012), 2012, : 101 - 104
  • [23] A Taint Analysis Framework Applied to Android Applications in the Packed State
    Shouying Bai
    Lu Ma
    Huan Ma
    Wei Liu
    China Communications, 2023, 20 (03) : 336 - 346
  • [24] FgDetector: Fine-grained Android Malware Detection
    Li, Dongfang
    Wang, Zhaoguo
    Li, Lixin
    Wang, Zhihua
    Wang, Yucheng
    Xue, Yibo
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 311 - 318
  • [25] Fine-Grained Complexity for Sparse Graphs
    Agarwal, Udit
    Ramachandran, Vijaya
    STOC'18: PROCEEDINGS OF THE 50TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2018, : 239 - 252
  • [26] Fine-Grained Error Analysis and Fair Evaluation of Labeled Spans
    Ortmann, Katrin
    LREC 2022: THIRTEEN INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION, 2022, : 1400 - 1407
  • [27] Practical Application-Level Dynamic Taint Analysis of Android Apps
    Schutte, Julian
    Kuchler, Alexander
    Titze, Dennis
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 17 - 24
  • [28] A scalable, flow-and-context-sensitive taint analysis of android applications
    Choi, Wontae
    Kannan, Jayanthkumar
    Babic, Domagoj
    JOURNAL OF COMPUTER LANGUAGES, 2019, 51 : 1 - 14
  • [29] The Impact of Tool Configuration Spaces on the Evaluation of Configurable Taint Analysis for Android
    Mordahl, Austin
    Wei, Shiyi
    ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2021, : 466 - 477
  • [30] A malware analysis platform based on taint analysis
    Zhang, Fan
    Yang, Minghui
    Xu, Mingdi
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 22 - 25