eddLeak: Enhancing Precision of Detecting Inter-app Data Leakage in Android Applications

被引:0
|
作者
Phan The Duy [1 ]
Van-Hau Pham [1 ]
Nguyen Tan Cam [2 ]
机构
[1] Vietnam Natl Univ, Univ Informat Technol, Informat Secur Lab, Ho Chi Minh City, Vietnam
[2] Hoa Sen Univ, Fac Sci & Technol, Ho Chi Minh City, Vietnam
关键词
android security analysis; inter-component communication; inter-application communication; sensitive information leakage; static analysis; inter-app leakage;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, mobile malware has grown to be significant types of behaviors, including stealing personal information of users, hijacking and surveilling user devices. Every year, it caused financial loss for infected enterprises, also more and more concerned about seriously secure data problems. Hence, many solutions have been proposed in order to detect malware leading to sensitive data leakage by analyzing mobile applications. Static analysis is a widely used technique for analyzing software, particularly in the security context, such as malware detection. Unfortunately, the static analysis technique often produces false alarms, which require significant manual effort to improve, such as DidFail tool. In this paper, we show how to analyze Android applications with static analysis to detect and identify which apps can be used to leak out sensitive information of users. We improve DidFail's architecture by implementing more modules and focus on the principles of Inter-Component Communication (ICC) between components in one or cross applications, then combining Android permission rules model to propose eddLeak approach, which enhance DidFail's precision of detecting inter-app leakage on Android applications and evaluate on customized application datasets.
引用
收藏
页码:674 / 679
页数:6
相关论文
共 50 条
  • [21] Analysis of Android Inter-App Security Vulnerabilities Using COVERT
    Sadeghi, Alireza
    Bagheri, Hamid
    Malek, Sam
    2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, 2015, : 725 - 728
  • [22] SEALANT: A Detection and Visualization Tool for Inter-app Security Vulnerabilities in Android
    Lee, Youn Kyu
    Yoodee, Peera
    Shahbazian, Arman
    Daye Nam
    Medvidovic, Nenad
    PROCEEDINGS OF THE 2017 32ND IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE'17), 2017, : 883 - 888
  • [23] A comprehensive framework for inter-app ICC security analysis of Android apps
    Nirumand, Atefeh
    Zamani, Bahman
    Ladani, Behrouz Tork
    AUTOMATED SOFTWARE ENGINEERING, 2024, 31 (02)
  • [24] ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis
    Li, Li
    Bartel, Alexandre
    Bissyande, Tegawende F.
    Klein, Jacques
    Le Traon, Yves
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 513 - 527
  • [25] Assessing the security of inter-app communications in android through reinforcement learning
    Romdhana, Andrea
    Merlo, Alessio
    Ceccato, Mariano
    Tonella, Paolo
    COMPUTERS & SECURITY, 2023, 131
  • [26] Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique
    Nguyen Tan Cam
    Van-Hau Pham
    Tuan Nguyen
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1055 - 1064
  • [27] Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique
    Nguyen Tan Cam
    Van-Hau Pham
    Tuan Nguyen
    Cluster Computing, 2019, 22 : 1055 - 1064
  • [28] Automated Repair of Information Flow Security in Android Implicit Inter-App Communication
    Tiwari, Abhishek
    Prakash, Jyoti
    Dong, Zhen
    Furia, Carlo A.
    FORMAL METHODS, PT I, FM 2024, 2025, 14933 : 285 - 303
  • [29] LinkFlow: Efficient Large-Scale Inter-app Privacy Leakage Detection
    He, Yi
    Li, Qi
    Sun, Kun
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 291 - 311
  • [30] Lifting inter-app data-flow analysis to large app sets
    Sattler, Florian
    von Rhein, Alexander
    Berger, Thorsten
    Johansson, Niklas Schalck
    Hardo, Mikael Mark
    Apel, Sven
    AUTOMATED SOFTWARE ENGINEERING, 2018, 25 (02) : 315 - 346