B-droid: A Static Taint Analysis Framework for Android Applications

被引:0
|
作者
ALmotairy, Rehab [1 ]
Daadaa, Yassine [1 ]
机构
[1] Al Imam Mohammad Ibn Saud Islamic Univ IMSIU, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
Static analysis; taint analysis; fuzz testing; android applications; mobile malwares; data flow analysis;
D O I
10.14569/IJACSA.2021.0120150
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Android is currently the most popular smartphone operating system in use, with its success attributed to the large number of applications available from the Google Play Store. However, these contain issues relating to the storage of the user's sensitive data, including contacts, location, and the phone's unique identifier (DIED. Use of these applications therefore risks exfiltration of this data, including unauthorized tracking of users' behavior and violation of their privacy. Sensitive data leaks are currently detected with taint analysis approaches. This paper addresses these issues by proposing a new static taint analysis framework specifically for Android platforms, termed "B-Droid". B-Droid is based on static taint analysis using a large set of sources and sinks techniques, side by side with the fuzz testing concept, in order to detect privacy leaks, whether malicious or unintentional by analyses the behavior of Applications Under Test (AUTs). This has the potential to offer improved precision in comparison to earlier approaches. To ensure the quality of our analysis, we undertook an evaluation testing a variety of Android applications installed on a mobile after filtering according to the relevant permissions. We found that B-Droid efficiently detected five of the most prevalent commercial spyware applications on the market, as well as issuing an immediate warning to the user, so that they can decide not to continue with the AUTs. This paper provides a detailed analysis of this method, along with its implementation and results.
引用
收藏
页码:421 / 430
页数:10
相关论文
共 50 条
  • [41] Scaling Static Taint Analysis to Industrial SOA Applications: A Case Study at Alibaba
    Wang, Jie
    Wu, Yunguang
    Zhou, Gang
    Yu, Yiming
    Guo, Zhenyu
    Xiong, Yingfei
    PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, : 1477 - 1486
  • [42] A Dynamic Taint Analysis Tool for Android App Forensics
    Xu, Zhen
    Shi, Chen
    Cheng, Chris Chao-Chun
    Gong, Neil Zhengqiang
    Guan, Yong
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 160 - 169
  • [43] Do Android Taint Analysis Tools Keep Their Promises?
    Pauck, Felix
    Bodden, Eric
    Wehrheim, Heike
    ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2018, : 331 - 341
  • [44] ANASTASIA: ANdroid mAlware detection using STAtic analySIs of Applications
    Fereidooni, Hossein
    Conti, Mauro
    Yao, Danfeng
    Sperduti, Alessandro
    2016 8TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2016,
  • [45] Droid Permission Miner: Mining Prominent Permissions for Android Malware Analysis
    Aswini, A. M.
    Vinod, P.
    2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 81 - 86
  • [46] T2Droid: A TrustZone-based Dynamic Analyser for Android Applications
    Yalew, Sileshi Demesie
    Maguire, Gerald Q., Jr.
    Haridi, Seif
    Correia, Miguel
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 240 - 247
  • [47] Droid-IoT: Detect Android IoT Malicious Applications Using ML and Blockchain
    Alshahrani, Hani Mohammed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 739 - 766
  • [48] Comparative Analysis of Two Approaches to Static Taint Analysis
    M. V. Belyaev
    N. V. Shimchik
    V. N. Ignatyev
    A. A. Belevantsev
    Programming and Computer Software, 2018, 44 : 459 - 466
  • [49] Comparative Analysis of Two Approaches to Static Taint Analysis
    Belyaev, M. V.
    Shimchik, N. V.
    Ignatyev, V. N.
    Belevantsev, A. A.
    PROGRAMMING AND COMPUTER SOFTWARE, 2018, 44 (06) : 459 - 466
  • [50] Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework
    Shim, Jaewoo
    Lim, Kyeonghwan
    Cho, Seong-je
    Han, Sangchul
    Park, Minkyu
    SECURITY AND COMMUNICATION NETWORKS, 2018,