Detecting Android Inter-App Data Leakage via Compositional Concolic Walking

被引:4
|
作者
Wu, Tianjun [1 ]
Yang, Yuexiang [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
来源
关键词
Inter-App data leakage; security audit; static taint analysis; concolic walking; vulnerability analysis;
D O I
10.31209/2019.100000079
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
While many research efforts have been around auditing individual android apps, the security issues related to the interaction among multiple apps are less studied. Due to the hidden nature of Inter-App communications, few existing security tools are able to detect such related vulnerable behaviors. This paper proposes to perform overall security auditing using dynamic analysis techniques. We focus on data leakage as it is one of the most common vulnerabilities for Android applications. We present an app auditing system AppWalker, which uses concolic execution on a set of apps. We use static Inter-App taint analysis to guide the dynamic auditing procedure, so that we can target at potential Inter-App data leakage. To mitigate the exponential blow-up when auditing various combinations of apps, we introduce a novel technique called compositional concolic walking. In the end of the auditing, the event and data inputs created during concolic walking are fed to the app set. By dynamically checking the triggered data-leaking behavior, we are then able to confirm the existence of Inter-App data leakage. AppWalker takes into account both infra- and inter-app communications, and is the first research work on dynamic audit of inter-app vulnerabilities in a path-sensitive way to our knowledge. Experimental results reveal that our method can effectively detect real-world Inter-App data leakage.
引用
收藏
页码:755 / 766
页数:12
相关论文
共 49 条
  • [31] Lifting inter-app data-flow analysis to large app sets
    Florian Sattler
    Alexander von Rhein
    Thorsten Berger
    Niklas Schalck Johansson
    Mikael Mark Hardø
    Sven Apel
    [J]. Automated Software Engineering, 2018, 25 : 315 - 346
  • [32] Roaming Through the Castle Tunnels: An Empirical Analysis of Inter-app Navigation of Android Apps
    Ma, Yun
    Hu, Ziniu
    Gu, Diandian
    Zhou, Li
    Mei, Qiaozhu
    Huang, Gang
    Liu, Xuanzhe
    [J]. ACM TRANSACTIONS ON THE WEB, 2020, 14 (03)
  • [33] Borrowing Your Enemy's Arrows: The Case of Code Reuse in Android via Direct Inter-app Code Invocation
    Gao, Jun
    Li, Li
    Kong, Pingfan
    Bissyande, Tegawende F.
    Klein, Jacques
    [J]. PROCEEDINGS OF THE 28TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '20), 2020, : 939 - 951
  • [34] LinkRadar: Assisting the Analysis of Inter-app Page Links via Transfer Learning
    Gu, Diandian
    Hu, Ziniu
    Du, Shangchen
    Ma, Yun
    [J]. PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, : 2077 - 2080
  • [35] Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications
    Bosu, Amiangshu
    Liu, Fang
    Yao, Danfeng
    Wang, Gang
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 71 - 85
  • [36] FlowMine: Android App Analysis via Data Flow
    Sinha, Lovely
    Bhandari, Shweta
    Faruki, Parvez
    Gaur, Manoj Singh
    Laxmi, Vijay
    Conti, Mauro
    [J]. 2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [37] Detecting Data Leakage from Databases on Android Apps with Concept Drift
    Kul, Gokhan
    Upadhyaya, Shambhu
    Chandola, Varun
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 905 - 913
  • [38] Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis
    Nguyen Tan Cam
    Van-Hau Pham
    Tuan Nguyen
    [J]. INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 298 - 305
  • [39] Data Leakage Between C/S Communication: A Case Study on Android Music App
    Li, Huanhuan
    Luo, Qian
    Zhang, Shubin
    Zhang, Haibin
    Liu, Jiajia
    [J]. 2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,
  • [40] MIGDroid: Detecting APP-Repackaging Android Malware via Method Invocation Graph
    Hu, Wenjun
    Tao, Jing
    Ma, Xiaobo
    Zhou, Wenyu
    Zhao, Shuang
    Han, Ting
    [J]. 2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,