Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques

被引:6
|
作者
Ami, Amit Seal [1 ]
Kafle, Kaushal [1 ]
Moran, Kevin [2 ]
Nadkarni, Adwait [1 ]
Poshyvanyk, Denys [1 ]
机构
[1] Coll William & Mary, Dept Comp Sci, POB 8795, Williamsburg, VA 23187 USA
[2] George Mason Univ, Dept Comp Sci, 4400 Univ Dr, Fairfax, VA 22030 USA
关键词
Security and privacy; software security engineering;
D O I
10.1145/3439802
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile application security has been a major area of focus for security research over the course of the last decade. Numerous application analysis tools have been proposed in response to malicious, curious, or vulnerable apps. However, existing tools, and specifically, static analysis tools, trade soundness of the analysis for precision and performance and are hence soundy. Unfortunately, the specific unsound choices or flaws in the design of these tools is often not known or well documented, leading to misplaced confidence among researchers, developers, and users. This article describes the Mutation-Based Soundness Evaluation (mu SE) framework, which systematically evaluates Android static analysis tools to discover, document, and fix flaws, by leveraging the well-founded practice of mutation analysis. We implemented mu SE and applied it to a set of prominent Android static analysis tools that detect private data leaks in apps. In a study conducted previously, we used mu SE to discover 13 previously undocumented flaws in FlowDroid, one of the most prominent data leak detectors for Android apps. Moreover, we discovered that flaws also propagated to other tools that build upon the design or implementation of FlowDroid or its components. This article substantially extends our mu SE framework and offers a new in-depth analysis of two more major tools in our 2020 study; we find 12 new, undocumented flaws and demonstrate that all 25 flaws are found in more than one tool, regardless of any inheritance-relation among the tools. Our results motivate the need for systematic discovery and documentation of unsound choices in soundy tools and demonstrate the opportunities in leveraging mutation testing in achieving this goal.
引用
收藏
页数:37
相关论文
共 16 条
  • [1] Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation
    Bonett, Richard
    Kafle, Kaushal
    Moran, Kevin
    Nadkarni, Adwait
    Poshyvanyk, Denys
    [J]. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1263 - 1280
  • [2] ,uSE: Mutation -based Evaluation of Security -focused Static Analysis Tools for Android
    Ami, Amit Seal
    Kafle, Kaushal
    Nadkarni, Adwait
    Poshyvanyk, Denys
    Moran, Kevin
    [J]. 2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), 2021, : 53 - 56
  • [3] Empirical evaluation of mutation-based test case prioritization techniques
    Shin, Donghwan
    Yoo, Shin
    Papadakis, Mike
    Bae, Doo-Hwan
    [J]. SOFTWARE TESTING VERIFICATION & RELIABILITY, 2019, 29 (1-2):
  • [4] A mutation-based approach for the formal and automated analysis of security ceremonies
    Sempreboni, Diego
    Vigano, Luca
    [J]. JOURNAL OF COMPUTER SECURITY, 2023, 31 (04) : 293 - 364
  • [5] μDep: Mutation-Based Dependency Generation for Precise Taint Analysis on Android Native Code
    Sun, Cong
    Ma, Yuwan
    Zeng, Dongrui
    Tan, Gang
    Ma, Siqi
    Wu, Yafei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1461 - 1475
  • [6] MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors
    Ami, Amit Seal
    Ahmed, Syed Yusuf
    Redoy, Radowan Mahmud
    Cooper, Nathan
    Ka, Kaushal
    Moran, Kevin
    Poshyvanyk, Denys
    Nadkarni, Adwait
    [J]. PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 2162 - 2166
  • [7] X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies
    Sempreboni, Diego
    Vigano, Luca
    [J]. 2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 87 - 104
  • [8] Static and adaptive mutation techniques for genetic algorithm: a systematic comparative analysis
    Rajakumar, B. R.
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2013, 8 (02) : 180 - 193
  • [9] Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms
    Botacin, Marcus
    de Geus, Paulo Licio
    Gregio, Andre
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [10] Model-based Static Source Code Analysis of Java']Java Programs with Applications to Android Security
    Lu, Zheng
    Mukhopadhyay, Supratik
    [J]. 2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, : 322 - 327