Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries

被引:0
|
作者
Beyza Cevik
Nur Altiparmak
Murat Aksu
Sevil Sen
机构
[1] Hacettepe University,WISE Lab., Department of Computer Engineering
[2] Izmir Bakircay University,Department of Computer Engineering
关键词
Android security; Description-to-permission fidelity; Third-party libraries; NLP; NLG;
D O I
暂无
中图分类号
学科分类号
摘要
Android app developers are expected to specify the use of dangerous permissions in their app descriptions. The absence of such data indicates suspicious behavior. However, this is not always caused by the malicious intent of developers; it may be due to the lack of documentation of the third-party libraries they use. To fill this gap in the literature, this study aims to enrich application descriptions with security-centric information of third-party libraries. To automatically generate application definitions, the study explores classifying libraries and extracting code summaries of library methods that use dangerous permissions and/or leak data. Both the textual information of third-party libraries and their source code are used to create these definitions. To the best of our knowledge, this is the first approach in the literature that creates app descriptions based on third-party libraries.
引用
收藏
页码:1107 / 1125
页数:18
相关论文
共 7 条
  • [1] Lib2Desc: automatic generation of security-centric Android app descriptions using third-party libraries
    Cevik, Beyza
    Altiparmak, Nur
    Aksu, Murat
    Sen, Sevil
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (05) : 1107 - 1125
  • [2] Towards Automatic Generation of Security-Centric Descriptions for Android Apps
    Zhang, Mu
    Duan, Yue
    Feng, Qian
    Yin, Heng
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 518 - 529
  • [3] Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps
    Wu, Tingmin
    Tang, Lihong
    Zhang, Rongjunchen
    Wen, Sheng
    Paris, Cecile
    Nepal, Surya
    Grobler, Marthie
    Xiang, Yang
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2019, 3 (04)
  • [4] Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications
    Duan, Yue
    Gao, Lian
    Hu, Jie
    Yin, Heng
    PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 277 - 292
  • [5] SurgeScan: Enforcing Security Policies on Untrusted Third-Party Android Libraries
    Vronsky, Jonathan
    Stevens, Ryan
    Chen, Hao
    2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [6] Automatic system for measuring security risk of Android application from third party app store
    Jang, Bogyu
    Lee, Jaeseung
    Lee, Manhee
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3190 - 3196
  • [7] Obfuscation-resilient detection of Android third-party libraries using multi-scale code dependency fusion
    Zhang, Zhao
    Luo, Senlin
    Lu, Yongxin
    Pan, Limin
    INFORMATION FUSION, 2025, 117