Boosting Static Analysis of Android Apps through Code Instrumentation

被引:6
|
作者
Li, Li [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, Luxembourg, Luxembourg
关键词
D O I
10.1145/2889160.2889258
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Static analysis has been applied to dissect Android apps for many years. The main advantage of using static analysis is its efficiency and entire code coverage characteristics. However, the community has not yet produced complete tools to perform in-depth static analysis, putting users at risk to malicious apps. Because of the diverse challenges caused by Android apps, it is hard for a single tool to efficiently address all of them. Thus, in this work, we propose to boost static analysis of Android apps through code instrumentation, in which the knotty code can be reduced or simplified into an equivalent but analyzable code. Consequently, existing static analyzers, without any modification, can be leveraged to perform extensive analysis, although originally they cannot. Previously, we have successfully applied instrumentation for two challenges of static analysis of Android apps: Inter Component Communication (ICC) and Reflection. However, these two case studies are implemented separately and the implementation is not reusable, letting some functionality, that could be reused from one to another, be reinvented and thus lots of resources are wasted. To this end, in this work, we aim at providing a generic and non-invasive approach for existing static analyzers, enabling them to perform more broad analysis.
引用
收藏
页码:819 / 822
页数:4
相关论文
共 50 条
  • [41] Protecting Android Apps from Repackaging Using Native Code
    Tanner, Simon
    Vogels, Ilian
    Wattenhofer, Roger
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 189 - 204
  • [42] An empirical catalog of code smells for the presentation layer of Android apps
    Carvalho, Suelen Goularte
    Aniche, Mauricio
    Verissimo, Julio
    Durelli, Rafael S.
    Gerosa, Marco Aurelio
    EMPIRICAL SOFTWARE ENGINEERING, 2019, 24 (06) : 3546 - 3586
  • [43] Learning Performance Optimization from Code Changes for Android Apps
    Feng, Ruitao
    Meng, Guozhu
    Xie, Xiaofei
    Su, Ting
    Liu, Yang
    Lin, Shang-Wei
    2019 IEEE 12TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2019), 2019, : 285 - 290
  • [44] A static technique for detecting input validation vulnerabilities in Android apps
    Fang, Zhejun
    Liu, Qixu
    Zhang, Yuqing
    Wang, Kai
    Wang, Zhiqiang
    Wu, Qianru
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [45] Static Detection of Event-based Races in Android Apps
    Hu, Yongjian
    Neamtiu, Iulian
    ACM SIGPLAN NOTICES, 2018, 53 (02) : 257 - 270
  • [46] A static technique for detecting input validation vulnerabilities in Android apps
    Zhejun FANG
    Qixu LIU
    Yuqing ZHANG
    Kai WANG
    Zhiqiang WANG
    Qianru WU
    ScienceChina(InformationSciences), 2017, 60 (05) : 210 - 225
  • [47] Static Binary Code Instrumentation for ARM Architecture
    Ermakov, Mikhail
    PERSPECTIVES OF SYSTEM INFORMATICS, PSI 2017, 2018, 10742 : 105 - 116
  • [48] Empirical Analysis of Android Apps Permissions
    Abu Bakar, Normi Sham Awang
    Mahmud, Iqram
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 406 - 411
  • [49] Artifacts for Dynamic Analysis of Android Apps
    Cai, Haipeng
    Ryder, Barbara G.
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, : 659 - 659
  • [50] Analysis of Malicious Behavior of Android Apps
    Singh, Pooja
    Tiwari, Pankaj
    Singh, Santosh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 215 - 220