SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications

被引:21
|
作者
Xu, Guangquan [1 ,2 ]
Wang, Weizhe [2 ]
Jiao, Litao [1 ]
Li, Xiaotong [2 ]
Liang, Kaitai [3 ]
Zheng, Xi [4 ]
Lian, Wenjuan [5 ]
Xian, Hequn [6 ]
Gao, Honghao [7 ]
机构
[1] Qingdao Huanghai Univ, Big Data Sch, Qingdao 266427, Peoples R China
[2] Tianjin Univ, Coll Intelligence & Comp, Tianjin Key Lab Adv Networking, Tianjin 30035, Peoples R China
[3] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[4] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
[5] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[6] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[7] Shanghai Univ, Comp Ctr, Shanghai 200444, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 04期
基金
美国国家科学基金会;
关键词
Libraries; Tools; Malware; Privacy; !text type='Java']Java[!/text; Security; Loading; Mobile privacy; mobile security; native C; C plus plus libraries; SO files; PROTOCOL;
D O I
10.1109/JIOT.2019.2944006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android Apps have become the most important mobile applications in the evolving mobile IoT systems, whose security and privacy are confronted with ever more challenges, since such mobile devices as smartphones involve too much personal privacy information. Meanwhile, the developers prefer to put core functions (e.g., encryption function and T9 search function) of Android applications in the native layer for execution efficiency. However, there are no automated security analysis tools to protect the security and privacy of the Android native layer, especially for those dynamically loaded third-party SO libraries. In order to solve the previous problem, which is confusing, we propose a novel and scalable system, called SoProtector, to prevent privacy from leaking via the analysis of data flow between the Java and native layers. For detection of the malicious function implanted in the SO libraries, SoProtector realizes a real-time engine. We derive the malware features via three steps: 1) present binary files in native family as a grayscale image; 2) with use of the ARM instructions set reversely obtain the code of the SO file and using Python to obtain the opcode sequence; and 3) each file is transformed as the form of assembly language by IDA Pro, which includes a gdl file as an accompaniment. Our experiment, which involved 3400 applications, demonstrates that SoProtector is able to detect more sinks, sources, and smudges. It effectively inspects and blocks at least 82% of the applications that are loading malicious third-party SO dynamically, and it has relatively low overhead in the meantime, compared to most of the existing static analysis tools (e.g., FlowDroid and AndroidLeaks).
引用
收藏
页码:2539 / 2552
页数:14
相关论文
共 8 条
  • [1] SoProtector: Securing Native C/C plus plus Libraries for Mobile Applications
    Zhang, Ning
    Xu, Guangquan
    Meng, Guozhu
    Zheng, Xi
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT III, 2018, 11336 : 417 - 431
  • [2] Security and Privacy for Mobile IoT Applications Using Blockchain
    Carvalho, Kevin
    Granjal, Jorge
    SENSORS, 2021, 21 (17)
  • [3] Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge
    Uddin, Mostafa
    Nadeem, Tamer
    Nukavarapu, Santosh
    2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2019,
  • [4] Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications
    Li, Xiong
    Liu, Shanpeng
    Wu, Fan
    Kumari, Saru
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 4755 - 4763
  • [5] Adaptive Key Management-Based Cryptographic Algorithm for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications
    Satyanarayana Pamarthi
    R. Narmadha
    Wireless Personal Communications, 2022, 124 : 349 - 376
  • [6] Comparative analysis of new meta-heuristic-variants for privacy preservation in wireless mobile adhoc networks for IoT applications
    Satyanarayana, P.
    Diwakar, G.
    Subbayamma, B. V.
    Kumar, N. V. Phani Sai
    Arun, M.
    Gopalakrishnan, S.
    COMPUTER COMMUNICATIONS, 2023, 198 : 262 - 281
  • [7] Adaptive Key Management-Based Cryptographic Algorithm for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications
    Pamarthi, Satyanarayana
    Narmadha, R.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) : 349 - 376
  • [8] Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications
    Klement, Felix
    Poehls, Henrich C.
    Spielvogel, Korbinian
    2020 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2020,