Memory Corruption Vulnerabilities Detection for Android Binary Software

被引:0
|
作者
Zhang, Bin [1 ]
Wu, Bo [1 ]
Feng, Chao [1 ]
Tang, Chaojing [1 ]
机构
[1] Natl Univ Def Technol, Sch Elect Sci & Engn, Changsha, Hunan, Peoples R China
来源
2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC) | 2015年
关键词
Memory corruption vulnerability; Selective symbolic execution; Android binary software;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The vulnerabilities exist in Android binary software bring critical threat to Mobile Internet security. In this paper, we put forward a novel method to detect memory corruption vulnerabilities for Android binary software which builds upon memory accession security rules and selective symbolic execution. We also implemented our prototype system and the evaluation results show that our method can detect the memory corruption vulnerabilities in Android binary software effectively and accurately.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 50 条
  • [41] A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes
    Sara Baradaran
    Mahdi Heidari
    Ali Kamali
    Maryam Mouzarani
    International Journal of Information Security, 2023, 22 : 1277 - 1290
  • [42] A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes
    Baradaran, Sara
    Heidari, Mahdi
    Kamali, Ali
    Mouzarani, Maryam
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1277 - 1290
  • [43] A Survey Paper on Vulnerabilities in Android OS and Security of Android Devices
    Meshram, P. D.
    Thool, R. C.
    2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 174 - 178
  • [44] Understanding the Evolution of Android App Vulnerabilities
    Gao, Jun
    Li, Li
    Kong, Pingfan
    Bissyande, Tegawende F.
    Klein, Jacques
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (01) : 212 - 230
  • [45] Two Vulnerabilities in Android OS Kernel
    Hei, Xiali
    Du, Xiaojiang
    Lin, Shan
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013, : 6123 - 6127
  • [46] Colluded Applications Vulnerabilities in Android Devices
    Khokhlov, Igor
    Reznik, Leon
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 462 - 469
  • [47] Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin
    Senanayake, Janaka
    Kalutarage, Harsha
    Al-Kadri, Mhd Omar
    Parovski, Andrei
    Piras, Luca
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVII, DBSEC 2023, 2023, 13942 : 339 - 357
  • [48] Estimating software vulnerabilities
    Jones, Jeffrey R.
    IEEE SECURITY & PRIVACY, 2007, 5 (04) : 28 - 32
  • [49] Two-Level Algebraic Method for Detection of Vulnerabilities in Binary Code
    Letychevskyi, Oleksandr
    PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 1074 - 1077
  • [50] Android ransomware detection using binary Jaya optimization algorithm
    Alazab, Moutaz
    EXPERT SYSTEMS, 2024, 41 (01)