A Static Analysis Model for Implicit Information Leakage in Android Application

被引:0
|
作者
Cao, Hongsheng [1 ]
Jiao, Jian [1 ]
Li, Denghui [2 ]
机构
[1] Beijing Informat Sci & Technol Univ, Sch Comp Sci, Beijing Key Lab Internet Culture & Digital Dissem, Beijing, Peoples R China
[2] Giant Interact Grp Inc, Shanghai, Peoples R China
关键词
Android application; implicit information flow; structure-related flow model; information leak; mobile security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The privacy information leakage can be divided into explicit and implicit information leakage. The detection of IIF (implicit information flow) is an important task in Android Security research. The IIF mechanisms are significantly different from traditional information leakage, because implicit information leakage adopted program structural changes in the way information is leaked. We find the correlation between basic blocks, control structures and expressions of the three different levels objects, proposal SRFM (Structure-Related Flow Model) to describe the relationship between the implicit flow and the control structure. A prototype system TSDroid (Structure-Related Flow Droid) is developed. The experiment shows that TSDroid can detect the implicit information leakage with more efficiency and higher precision than other traditional methods.
引用
收藏
页码:1133 / 1140
页数:8
相关论文
共 50 条
  • [31] Static Information Flow Analysis with Handling of Implicit Flows and A Study on Effects of Implicit Flows vs Explicit Flows
    Liu, Yin
    Milanova, Ana
    14TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING (CSMR 2010), 2010, : 146 - 155
  • [32] Experiment and static implicit analysis of springback in bend forming of a bumper model
    Ohwue, T
    Yoshida, T
    Shirai, Y
    Kikuma, T
    MATERIALS TRANSACTIONS, 2003, 44 (05) : 946 - 950
  • [33] Get Twitter Information : A Collaborative Android Application for Big Data Analysis
    Kaur, Harneet
    Talluri, Manasvi
    He, Jing
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS, 2015, : 483 - 484
  • [34] A Multidimensional Detection Model of Android Malicious Applications Based on Dynamic and Static Analysis
    Zhang, Hao
    Liu, Donglan
    Liu, Xin
    Ma, Lei
    Wang, Rui
    Zhang, Fangzhe
    Sun, Lili
    Zhao, Fuhui
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 11 - 21
  • [35] Privacy Analysis of Android Apps: Implicit Flows and Quantitative Analysis
    Barbon, Gianluca
    Cortesi, Agostino
    Ferrara, Pietro
    Pistoia, Marco
    Tripp, Omer
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, 2015, 9339 : 3 - 23
  • [36] A Review of Static Detection Methods for Android Malicious Application
    Pan J.
    Cui Z.
    Lin G.
    Chen X.
    Zheng L.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (08): : 1875 - 1894
  • [37] An Evaluation Model for Information Security of Android Application Based on Analytic Hierarchy Process
    Wan Yan
    Wang Guolin
    Feng Xiangyang
    2016 WORLD AUTOMATION CONGRESS (WAC), 2016,
  • [38] Detection of sensitive information leakage in Android applications using signature generation
    Kuzuno, Hiroki
    Tonami, Satoshi
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (01) : 53 - 62
  • [39] Stealthy Information Leakage from Android Smartphone through Screenshot and OCR
    Kim, Yeon-kyung
    Yoon, Han-Jea
    Lee, Man-Hee
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CHEMICAL, MATERIAL AND FOOD ENGINEERING, 2015, 22 : 779 - 782
  • [40] Kunai: A static analysis framework for Android apps
    Blazquez, Eduardo
    Tapiador, Juan
    SOFTWAREX, 2023, 22