Memory Corruption Vulnerabilities Detection for Android Binary Software

被引:0
|
作者
Zhang, Bin [1 ]
Wu, Bo [1 ]
Feng, Chao [1 ]
Tang, Chaojing [1 ]
机构
[1] Natl Univ Def Technol, Sch Elect Sci & Engn, Changsha, Hunan, Peoples R China
来源
2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC) | 2015年
关键词
Memory corruption vulnerability; Selective symbolic execution; Android binary software;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The vulnerabilities exist in Android binary software bring critical threat to Mobile Internet security. In this paper, we put forward a novel method to detect memory corruption vulnerabilities for Android binary software which builds upon memory accession security rules and selective symbolic execution. We also implemented our prototype system and the evaluation results show that our method can detect the memory corruption vulnerabilities in Android binary software effectively and accurately.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 50 条
  • [21] Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices
    Salehi, Majid
    Degani, Luca
    Roveri, Marco
    Hughes, Danny
    Crispo, Bruno
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1124 - 1138
  • [22] Practical Experience Report: Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices
    English, K. Virgil
    Obaidat, Islam
    Sridhar, Meera
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 247 - 255
  • [23] A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities
    Deng, Fenglei
    Wang, Jian
    Zhang, Bin
    Feng, Chao
    Jiang, Zhiyuan
    Su, Yunfei
    SCIENTIFIC PROGRAMMING, 2020, 2020
  • [24] MaDMAN: Detection of Software Attacks Targeting Hardware Vulnerabilities
    Polychronou, Nikolaos Foivos
    Thevenon, Pierre-Henri
    Puys, Maxime
    Beroulle, Vincent
    2021 24TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2021), 2021, : 355 - 362
  • [25] Software Vulnerabilities' Detection by Analysing Application Execution Traces
    Koala, Gouayon
    Bassole, Didier
    Tiendrebeogo, Telesphore
    Sie, Oumarou
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 1288 - 1294
  • [26] Android Smartphone Vulnerabilities : A Survey
    Joshi, Jignesh
    Parekh, Chandresh
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND AUTOMATION (ICACCA 2016), 2016, : 27 - 31
  • [27] Analysis of Latest Vulnerabilities in Android
    Umasankar
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1236 - 1241
  • [28] The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
    Hanif, Hazim
    Nasir, Mohd Hairul Nizam Md
    Ab Razak, Mohd Faizal
    Firdaus, Ahmad
    Anuar, Nor Badrul
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 179
  • [29] SEALANT: A Detection and Visualization Tool for Inter-app Security Vulnerabilities in Android
    Lee, Youn Kyu
    Yoodee, Peera
    Shahbazian, Arman
    Daye Nam
    Medvidovic, Nenad
    PROCEEDINGS OF THE 2017 32ND IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE'17), 2017, : 883 - 888
  • [30] DroidSecTester: Towards context-driven modelling and detection of Android application vulnerabilities
    Baheux, Ivan
    Aktouf, Oum-El-Kheir
    Tebib, Mohammed El Amin
    Graa, Mariem
    Andre, Pascal
    Ledru, Yves
    2023 IEEE 34TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS, ISSREW, 2023, : 136 - 141