revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps

被引:16
|
作者
Fang, Zheran [1 ]
Han, Weili [1 ]
Li, Dong [1 ]
Guo, Zeqing [1 ]
Guo, Danhao [1 ]
Wang, Xiaoyang Sean [1 ]
Qian, Zhiyun [2 ]
Chen, Hao [3 ]
机构
[1] Fudan Univ, Shanghai, Peoples R China
[2] Univ Calif Riverside, Riverside, CA 92521 USA
[3] ShanghaiTech Univ, Shanghai, Peoples R China
关键词
Android Security; Permission Over-claim; Permission Revocation; revDroid;
D O I
10.1145/2897845.2897914
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic revocation of permissions of installed Android applications has been gaining popularity, because of the increasing concern of security and privacy in the Android platform. However, applications often crash or misbehave when their permissions are revoked, rendering applications completely unusable. Even though Google has officially introduced the new permission mechanism in Android 6.0 to explicitly support dynamic permission revocation, the issue still exists. In this paper, we conduct an empirical study to understand the latest application practice post Android 6.0. Specifically, we design a practical tool, referred to as revDroid, to help us to empirically analyze how often the undesirable side effects, especially application crash, can occur in off-the-shelf Android applications. From the analysis of 248 popular applications from Google Play Store, revDroid finds out that 70% applications and 46% permission-relevant calls do not appropriately catch exceptions caused by permission revocation, while third-party libraries pay much more attention to permission revocation. We also user evDroid to analyze 132 recent malware samples. The result shows that only 27% malwares and 36% permission-relevant API calls of malwares fail to consider the permission revocation. In fact, many of them perform specialized handling of permission revocation to keep the core malicious logic running. Finally, r evDroid can be used to help developers uncover the unhandled permission revocations during development time and greatly improve the application quality.
引用
收藏
页码:747 / 758
页数:12
相关论文
共 50 条
  • [1] Android Apps:Static Analysis Based on Permission Classification
    Zhenjiang Dong
    Hui Ye
    Yan Wu
    Shaoyin Cheng
    Fan Jiang
    ZTECommunications, 2013, 11 (01) : 62 - 66
  • [2] Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps
    Zhang, Yuan
    Yang, Min
    Yang, Zhemin
    Gu, Guofei
    Ning, Peng
    Zang, Binyu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (11) : 1828 - 1842
  • [3] Security analysis of permission re-delegation vulnerabilities in Android apps
    Biniam Fisseha Demissie
    Mariano Ceccato
    Lwin Khin Shar
    Empirical Software Engineering, 2020, 25 : 5084 - 5136
  • [4] Security analysis of permission re-delegation vulnerabilities in Android apps
    Demissie, Biniam Fisseha
    Ceccato, Mariano
    Shar, Lwin Khin
    EMPIRICAL SOFTWARE ENGINEERING, 2020, 25 (06) : 5084 - 5136
  • [5] Artifacts for Dynamic Analysis of Android Apps
    Cai, Haipeng
    Ryder, Barbara G.
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, : 659 - 659
  • [6] Machine learning-based dynamic analysis of Android apps with improved code coverage
    Yerima, Suleiman Y.
    Alzaylaee, Mohammed K.
    Sezer, Sakir
    EURASIP JOURNAL ON INFORMATION SECURITY, 2019, 2019 (1)
  • [7] Machine learning-based dynamic analysis of Android apps with improved code coverage
    Suleiman Y. Yerima
    Mohammed K. Alzaylaee
    Sakir Sezer
    EURASIP Journal on Information Security, 2019
  • [8] Reevaluating Android Permission Gaps with Static and Dynamic Analysis
    Wang, Haoyu
    Guo, Yao
    Tang, Zihao
    Bai, Guangdong
    Chen, Xiangqun
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [9] Method-level Permission Analysis based on Static Call Graph of Android Apps
    Hu, Yan
    Kong, Weiqiang
    Ding, Feng
    Yan, Jun
    2018 5TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND THEIR APPLICATIONS (DSA), 2018, : 8 - 14
  • [10] Obfuscating Code Vulnerabilities Against Static Analysis in Android Apps
    Pagano, Francesco
    Verderame, Luca
    Merlo, Alessio
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2024, 2024, 710 : 381 - 395