B-droid: A Static Taint Analysis Framework for Android Applications

被引:0
|
作者
ALmotairy, Rehab [1 ]
Daadaa, Yassine [1 ]
机构
[1] Al Imam Mohammad Ibn Saud Islamic Univ IMSIU, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
Static analysis; taint analysis; fuzz testing; android applications; mobile malwares; data flow analysis;
D O I
10.14569/IJACSA.2021.0120150
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Android is currently the most popular smartphone operating system in use, with its success attributed to the large number of applications available from the Google Play Store. However, these contain issues relating to the storage of the user's sensitive data, including contacts, location, and the phone's unique identifier (DIED. Use of these applications therefore risks exfiltration of this data, including unauthorized tracking of users' behavior and violation of their privacy. Sensitive data leaks are currently detected with taint analysis approaches. This paper addresses these issues by proposing a new static taint analysis framework specifically for Android platforms, termed "B-Droid". B-Droid is based on static taint analysis using a large set of sources and sinks techniques, side by side with the fuzz testing concept, in order to detect privacy leaks, whether malicious or unintentional by analyses the behavior of Applications Under Test (AUTs). This has the potential to offer improved precision in comparison to earlier approaches. To ensure the quality of our analysis, we undertook an evaluation testing a variety of Android applications installed on a mobile after filtering according to the relevant permissions. We found that B-Droid efficiently detected five of the most prevalent commercial spyware applications on the market, as well as issuing an immediate warning to the user, so that they can decide not to continue with the AUTs. This paper provides a detailed analysis of this method, along with its implementation and results.
引用
收藏
页码:421 / 430
页数:10
相关论文
共 50 条
  • [1] A Taint Analysis Framework Applied to Android Applications in the Packed State
    Bai, Shouying
    Ma, Lu
    Ma, Huan
    Liu, Wei
    CHINA COMMUNICATIONS, 2023, 20 (03) : 336 - 346
  • [2] A Taint Analysis Framework Applied to Android Applications in the Packed State
    Shouying Bai
    Lu Ma
    Huan Ma
    Wei Liu
    China Communications, 2023, 20 (03) : 336 - 346
  • [3] Taint Analysis of Arrays in Android Applications
    Maalouf, Assad
    Lu, Lunjin
    36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 893 - 899
  • [4] HybriDroid: Static Analysis Framework for Android Hybrid Applications
    Lee, Sungho
    Dolby, Julian
    Ryu, Sukyoung
    2016 31ST IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2016, : 250 - 261
  • [5] An efficient approach for taint analysis of android applications
    Zhang, Jie
    Tian, Cong
    Duan, Zhenhua
    COMPUTERS & SECURITY, 2021, 104
  • [6] FastDroid: Efficient Taint Analysis for Android Applications
    Zhang, Jie
    Tian, Cong
    Duan, Zhenhua
    2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2019), 2019, : 236 - 237
  • [7] R-Droid: Leveraging Android App Analysis with Static Slice Optimization
    Backes, Michael
    Bugiel, Sven
    Derr, Erik
    Gerling, Sebastian
    Hammer, Christian
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 129 - 140
  • [8] Android Static Taint Analysis of Dynamic Loading and Reflection Mechanism
    Yue H.
    Zhang Y.
    Wang W.
    Liu Q.
    1600, Science Press (54): : 313 - 327
  • [9] LeakMiner: Detect information leakage on Android with static taint analysis
    Yang, ZheMin
    Yang, Min
    PROCEEDINGS OF THE 2012 THIRD WORLD CONGRESS ON SOFTWARE ENGINEERING (WCSE 2012), 2012, : 101 - 104
  • [10] Android static taint analysis based on multi branch search association
    Tang, Chenghua
    Du, Zheng
    Yang, Mengmeng
    Qiang, Baohua
    COMPUTERS & SECURITY, 2023, 129