Dark Hazard: Learning-based, Large-scale Discovery of Hidden Sensitive Operations in Android Apps

被引:28
|
作者
Pan, Xiaorui [1 ]
Wang, Xueqiang [1 ]
Duan, Yue [2 ]
Wang, XiaoFeng [1 ]
Yin, Heng [2 ]
机构
[1] Indiana Univ, Bloomington, IN 47405 USA
[2] Univ Calif Riverside, Riverside, CA 92521 USA
基金
美国国家科学基金会;
关键词
D O I
10.14722/ndss.2017.23265
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hidden sensitive operations (HSO) such as stealing privacy user data upon receiving an SMS message are increasingly utilized by mobile malware and other potentially-harmful apps (PHAs) to evade detection. Identification of such behaviors is hard, due to the challenge in triggering them during an app's runtime. Current static approaches rely on the trigger conditions or hidden behaviors known beforehand and therefore cannot capture previously unknown HSO activities. Also these techniques tend to be computationally intensive and therefore less suitable for analyzing a large number of apps. As a result, our understanding of real-world HSO today is still limited, not to mention effective means to mitigate this threat. In this paper, we present HSOMINER, an innovative machinelearning based program analysis technique that enables a large-scale discovery of unknown HSO activities. Our approach leverages a set of program features that characterize an HSO branch' and can be relatively easy to extract from an app. These features summarize a set of unique observations about an HSO condition, its paths and the relations between them, and are designed to be general for finding hidden suspicious behaviors. Particularly, we found that a trigger condition is less likely to relate to the path of its branch through data flows or shared resources, compared with a legitimate branch. Also, the behaviors exhibited by the two paths of an HSO branch tend to be conspicuously different (innocent on one side and sinister on the other). Most importantly, even though these individual features are not sufficiently accurate for capturing HSO on their own, collectively they are shown to be highly effective in identifying such behaviors. This differentiating power is harnessed by HSOMINER to classify Android apps, which achieves a high precision (>98%) and coverage (>94%), and is also efficient as discovered in our experiments. The new tool was further used in a measurement study involving 338,354 realworld apps, the largest one ever conducted on suspicious hidden operations. Our research brought to light the pervasiveness of HSO activities, which are present in 18.7% of the apps we analyzed, surprising trigger conditions (e.g., click on a certain region of a view) and behaviors (e.g., hiding operations in a dynamically generated receiver), which help better understand the problem and contribute to more effective defense against this new threat to the mobile platform.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Demystifying Hidden Sensitive Operations in Android Apps
    Sun, Xiaoyu
    Chen, Xiao
    Li, Li
    Cai, Haipeng
    Grundy, John
    Samhi, Jordan
    Bissyande, Tegawende
    Klein, Jacques
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 32 (02)
  • [2] Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps
    Samhi, Jordan
    Li, Li
    Bissyande, Tegawende F.
    Klein, Jacques
    2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 723 - 735
  • [3] MUBot: Learning to Test Large-Scale Commercial Android Apps like a Human
    Peng, Chao
    Zhang, Zhao
    Lv, Zhengwei
    Yang, Ping
    2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 543 - 552
  • [4] Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
    Choi, Hyunwoo
    Kim, Yongdae
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [5] Large-Scale Analysis of Framework-Specific Exceptions in Android Apps
    Fan, Lingling
    Su, Ting
    Chen, Sen
    Meng, Guozhu
    Liu, Yang
    Xu, Lihua
    Pu, Geguang
    Su, Zhendong
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 408 - 419
  • [6] MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps
    Li, Wei
    Yang, Borui
    Ye, Hangyu
    Xiang, Liyao
    Tao, Qingxiao
    Wang, Xinbing
    Zhou, Chenghu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2099 - 2114
  • [7] Deep Reinforcement Learning-Based Large-Scale Robot Exploration
    Cao, Yuhong
    Zhao, Rui
    Wang, Yizhuo
    Xiang, Bairan
    Sartoretti, Guillaume
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2024, 9 (05) : 4631 - 4638
  • [8] Testing of Mobile Applications in the Wild: A Large-Scale Empirical Study on Android Apps
    Pecorelli, Fabiano
    Catolino, Gemma
    Ferrucci, Filomena
    De Lucia, Andrea
    Palomba, Fabio
    2020 IEEE/ACM 28TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION, ICPC, 2020, : 296 - 307
  • [9] A large-scale exploratory study of android sports apps in the google play store
    Chembakottu, Bhagya
    Li, Heng
    Khomh, Foutse
    INFORMATION AND SOFTWARE TECHNOLOGY, 2023, 164
  • [10] AndroZooOpen: Collecting Large-scale Open Source Android Apps for the Research Community
    Liu, Pei
    Li, Li
    Zhao, Yanjie
    Sun, Xiaoyu
    Grundy, John
    2020 IEEE/ACM 17TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2020, : 548 - 552