μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code

被引:1
|
作者
Sun, Cong [1 ]
Ma, Yuwan [1 ]
Zeng, Dongrui [2 ,3 ]
Tan, Gang [2 ]
Ma, Siqi [4 ]
Wu, Yafei [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Penn State Univ, State Coll, PA 16801 USA
[3] Palo Alto Networks Inc, Santa Clara, CA 95054 USA
[4] Univ New South Wales, Canberra, ACT 2612, Australia
基金
中国国家自然科学基金;
关键词
Codes; !text type='Java']Java[!/text; Static analysis; Libraries; Data models; Semantics; Load modeling; Android; information flow analysis; !text type='java']java[!/text] native interface; static analysis; TRACKING INFORMATION FLOWS;
D O I
10.1109/TDSC.2022.3155693
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existence of native code in Android apps plays an important role in triggering inconspicuous propagation of secrets and circumventing malware detection. However, the state-of-the-art information-flow analysis tools for Android apps all have limited capabilities of analyzing native code. Due to the complexity of binary-level static analysis, most static analyzers choose to build conservative models for a selected portion of native code. Though the recent inter-language analysis improves the capability of tracking information flow in native code, it is still far from attaining similar effectiveness of the state-of-the-art information-flow analyzers that focus on non-native Java methods. To overcome the above constraints, we propose a new analysis framework, mu Dep, to detect sensitive information flows of the Android apps containing native code. In this framework, we combine a control-flow based static binary analysis with a mutation-based dynamic analysis to model the tainting behaviors of native code in the apps. Based on the result of the analyses, mDep conducts a stub generation for the related native functions to facilitate the state-of-the-art analyzer DroidSafe with finegrained tainting behavior summaries of native code. The experimental results show that our framework is competitive on the accuracy, and effective in analyzing the information flows in real-world apps and malware compared with the state-of-the-art inter-language static analysis.
引用
收藏
页码:1461 / 1475
页数:15
相关论文
共 50 条
  • [31] A mutation-based approach for the formal and automated analysis of security ceremonies
    Sempreboni, Diego
    Vigano, Luca
    JOURNAL OF COMPUTER SECURITY, 2023, 31 (04) : 293 - 364
  • [32] Mutation-Based Test Generation for Quantum Programs with Multi-Objective Search
    Wang, Xinyi
    Yu, Tongxuan
    Arcaini, Paolo
    Yue, Tao
    Ali, Shaukat
    PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'22), 2022, : 1345 - 1353
  • [33] Mutation-based Generation Algorithm of Negative Test Strings from Regular Expressions
    Zheng L.-X.
    Yu L.-L.
    Chen H.-M.
    Chen Z.-X.
    Luo X.-Y.
    Wang X.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (07): : 3355 - 3376
  • [34] Mutation-Based Test Generation for PLC Embedded Software Using Model Checking
    Enoiu, Eduard P.
    Sundmark, Daniel
    Causevic, Adnan
    Feldt, Robert
    Pettersson, Paul
    TESTING SOFTWARE AND SYSTEMS, ICTSS 2016, 2016, 9976 : 155 - 171
  • [35] Android software vulnerability mining framework based on dynamic taint analysis technology
    Zhao Min
    Yang Haimin
    Chen Ping
    Yang Zhengxing
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2112 - 2115
  • [36] PBDG: a malicious code detection method based on precise behaviour dependency graph
    Tang, Chenghua
    Yang, Mengmeng
    Gao, Qingze
    Qiang, Baohua
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02) : 163 - 189
  • [37] Dynamic taint tracking of Web application based on static code analysis
    Zhao, Jingling
    Qi, Junxin
    Zhou, Liang
    Cui, Baojiang
    2016 10TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2016, : 96 - 101
  • [38] Theoretical analysis of a mutation-based evolutionary algorithm for a tracking problem in the lattice
    Jansen, Thomas
    Schellbach, Ulf
    GECCO 2005: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOLS 1 AND 2, 2005, : 841 - 848
  • [39] Test data generation for covering mutation-based path using MGA for MPI program
    Dang, Xiangying
    Wang, Jinyong
    Gong, Dunwei
    Yao, Xiangjuan
    Wei, Changqing
    Xu, Biao
    JOURNAL OF SYSTEMS AND SOFTWARE, 2024, 210
  • [40] FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps
    Arzt, Steven
    Rasthofer, Siegfried
    Fritz, Christian
    Bodden, Eric
    Bartel, Alexandre
    Klein, Jacques
    Le Traon, Yves
    Octeau, Damien
    McDaniel, Patrick
    ACM SIGPLAN NOTICES, 2014, 49 (06) : 259 - 269