μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code

被引:1
|
作者
Sun, Cong [1 ]
Ma, Yuwan [1 ]
Zeng, Dongrui [2 ,3 ]
Tan, Gang [2 ]
Ma, Siqi [4 ]
Wu, Yafei [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Penn State Univ, State Coll, PA 16801 USA
[3] Palo Alto Networks Inc, Santa Clara, CA 95054 USA
[4] Univ New South Wales, Canberra, ACT 2612, Australia
基金
中国国家自然科学基金;
关键词
Codes; !text type='Java']Java[!/text; Static analysis; Libraries; Data models; Semantics; Load modeling; Android; information flow analysis; !text type='java']java[!/text] native interface; static analysis; TRACKING INFORMATION FLOWS;
D O I
10.1109/TDSC.2022.3155693
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existence of native code in Android apps plays an important role in triggering inconspicuous propagation of secrets and circumventing malware detection. However, the state-of-the-art information-flow analysis tools for Android apps all have limited capabilities of analyzing native code. Due to the complexity of binary-level static analysis, most static analyzers choose to build conservative models for a selected portion of native code. Though the recent inter-language analysis improves the capability of tracking information flow in native code, it is still far from attaining similar effectiveness of the state-of-the-art information-flow analyzers that focus on non-native Java methods. To overcome the above constraints, we propose a new analysis framework, mu Dep, to detect sensitive information flows of the Android apps containing native code. In this framework, we combine a control-flow based static binary analysis with a mutation-based dynamic analysis to model the tainting behaviors of native code in the apps. Based on the result of the analyses, mDep conducts a stub generation for the related native functions to facilitate the state-of-the-art analyzer DroidSafe with finegrained tainting behavior summaries of native code. The experimental results show that our framework is competitive on the accuracy, and effective in analyzing the information flows in real-world apps and malware compared with the state-of-the-art inter-language static analysis.
引用
收藏
页码:1461 / 1475
页数:15
相关论文
共 50 条
  • [41] Modular code generation from hybrid automata based on data dependency
    Kim, J
    Lee, I
    9TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2003, : 160 - 168
  • [42] Fuzz Testing with Dynamic Taint Analysis based Tools for Faster Code Coverage
    Paduraru, Ciprian
    Melemciuc, Marius-Constantin
    Ghimis, Bogdan
    ICSOFT: PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2019, : 82 - 93
  • [43] GNNDroid: Graph-Learning Based Malware Detection for Android Apps With Native Code
    Xi, Ning
    Zhang, Yuchen
    Feng, Pengbin
    Ma, Siqi
    Ma, Jianfeng
    Shen, Yulong
    Yang, Yale
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1460 - 1476
  • [44] Study on Android Native Layer Code Protection Based on Improved O-LLVM
    Cui, Baojiang
    Zhao, Qi
    Liu, Tianyu
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2017, 2018, 612 : 275 - 285
  • [45] Study on android native layer code protection based on improved o-llvm
    Cui, Baojiang
    Zhao, Qi
    Liu, Tianyu
    Advances in Intelligent Systems and Computing, 2017, 612 : 275 - 285
  • [46] Mutation-based simulation test data generation for testing complex real-time software
    Bai, Xiaoying
    Lee, Shufang
    Chen, Yinong
    40TH ANNUAL SIMULATION SYMPOSIUM, PROCEEDINGS, 2007, : 73 - 80
  • [47] Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java']Java
    Kan, Shuangxiang
    Gao, Yuhao
    Zhong, Zexin
    Sui, Yulei
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 50 (06) : 1518 - 1533
  • [48] X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies
    Sempreboni, Diego
    Vigano, Luca
    2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 87 - 104
  • [49] Research and implementation of android embedded code generation method based on rule model
    Hu, Wen
    Zhang, Kai
    International Journal of Multimedia and Ubiquitous Engineering, 2014, 9 (11): : 273 - 282
  • [50] Mutation-based treatment recommendations from next generation sequencing data: A comparison of web tools.
    Patel, Jaymin
    Reiner, Eric
    Bossuyt, Veerle
    Epstein, Lianne
    Platt, James
    DiGiovanna, Michael
    Chung, Gina G.
    Silber, Andrea
    Sanft, Tara Beth
    Hofstatter, Erin Wysong
    Mougalian, Sarah Schellhorn
    Abu-Khalaf, Maysa M.
    Gershkovich, Peter
    Hatzis, Christos
    Pusztai, Lajos
    JOURNAL OF CLINICAL ONCOLOGY, 2015, 33 (15)