A fine-grained approach for Android taint analysis based on labeled taint value graphs

被引:0
|
作者
Xiang, Dongming [1 ]
Lin, Shuai [1 ]
Huang, Ke [2 ]
Ding, Zuohua [1 ]
Liu, Guanjun [3 ,4 ]
Li, Xiaofeng [5 ,6 ]
机构
[1] Zhejiang Sci Tech Univ, Sch Comp Sci & Technol, Hangzhou 310000, Zhejiang, Peoples R China
[2] Zhejiang Petr Comprehens Energy Sales Co Ltd, Jinhua 321013, Zhejiang, Peoples R China
[3] Tongji Univ, Key Lab Embedded Syst & Serv Comp, Dept Comp Sci, Minist Educ, Shanghai 200092, Peoples R China
[4] Tongji Univ, Shanghai Elect Transact & Informat Serv, Collaborat Innovat Ctr, Shanghai 200092, Peoples R China
[5] Beijing Inst Control Engn, Beijing 100094, Peoples R China
[6] Northwestern Polytech Univ, Sch Software, Xian 710129, Shanxi, Peoples R China
关键词
Static taint analysis; Android security; Vulnerability detection; Fine-grained analysis;
D O I
10.1016/j.cose.2024.104162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Static taint analysis is a widely used method to identify vulnerabilities in Android applications. However, the existing tools for static analysis often struggle with processing times, particularly when dealing with complex real-world programs. To reduce time consumption, some tools choose to sacrifice analytical precision, e.g., FastDroid sets an upper limit for analysis iterations in Android applications. In this paper, we propose a labeled taint value graph (LTVG) to store taint flows, and implement a fine-grained analysis tool called LabeledDroid. This graph is constructed based on the taint value graph (TVG) of FastDroid, and takes into account both precision and time consumption. That is, we decompile an Android app into Jimple statements, develop finegrained propagation rules to handle List, and construct LTVGs according to these rules. Afterwards, we traverse LTVGs to obtain high-precision taint flows. An analysis of 39 apps from the TaintBench benchmark shows that LabeledDroid is 0.87 s faster than FastDroid on average. Furthermore, if some common accuracy parameters are adapted in both LabeledDroid and FastDroid, the experiment demonstrates that the former is more scalable. Moreover, the maximum analysis time of LabeledDroid is less than 200 s and its average time is 46.25 s, while FastDroid sometimes experiences timeouts with durations longer than 600 s. Additionally, LabeledDroid achieves a precision of 70% in handling lists, while FastDroid and TaintSA achieve precisions of 38.9% and 41.2%, respectively.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Program Crash Analysis based on Taint analysis
    Zhang Puhan
    Wu Jianxiong
    Xin, Wang
    Wu, Zehui
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 492 - 498
  • [32] B-droid: A Static Taint Analysis Framework for Android Applications
    ALmotairy, Rehab
    Daadaa, Yassine
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (01) : 421 - 430
  • [33] Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis
    Cai, Haipeng
    Jenkins, John
    2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), 2018, : 265 - 269
  • [34] Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps
    Youssef, Ayman
    Shosha, Ahmed F.
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [35] A simulation-based approach for fine-grained project plan analysis
    Dai, Jian
    Wang, Qing
    Li, Mingshu
    Xiao, Junchao
    Liu, Dapeng
    Wasif, M.
    Ruan, Li
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 4, PROCEEDINGS, 2007, : 579 - +
  • [36] µDep: Mutation-based Dependency Generation for Precise Taint Analysis on Android Native Code
    Sun, Cong
    Ma, Yuwan
    Zeng, Dongrui
    Tan, Gang
    Ma, Siqi
    Wu, Yafei
    arXiv, 2021,
  • [37] Bounds checking with taint-based analysis
    Chuang, Weihaw
    Narayanasamy, Satish
    Calder, Brad
    Jhala, Ranjit
    HIGH PERFORMANCE EMBEDDED ARCHITECTURES AND COMPILERS, PROCEEDINGS, 2007, 4367 : 71 - +
  • [38] μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code
    Sun, Cong
    Ma, Yuwan
    Zeng, Dongrui
    Tan, Gang
    Ma, Siqi
    Wu, Yafei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1461 - 1475
  • [39] Android Malware Detection Using Fine-Grained Features
    Jiang, Xu
    Mao, Baolei
    Guan, Jun
    Huang, Xingli
    SCIENTIFIC PROGRAMMING, 2020, 2020
  • [40] Perman: Fine-grained Permission Management for Android Applications
    Fu, Jiaojiao
    Zhou, Yangfan
    Liu, Huan
    Kang, Yu
    Wang, Xin
    2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 250 - 259