全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2015 

Android应用软件功能泄露漏洞挖掘工具的设计与实现
Design and implementation of capability leak detection for Android applications

DOI: 10.7523/j.issn.2095-6134.2015.01.021

Keywords: 功能泄露漏洞,静态分析,程序切片,Android安全
capability leak vulnerability
,static analysis,program slicing,Android security

Full-Text   Cite this paper   Add to My Lib

Abstract:

摘要 Android平台的功能泄露漏洞会导致权限提升和隐私泄露等严重危害,常被恶意软件用于绕过安全机制.针对这一问题,提出一个基于静态分析的功能泄露漏洞挖掘工具CLDroid.CLDroid使用逆向控制流的程序切片算法从源代码中提取程序逻辑,并利用可定制的安全规则库来检测违规行为.实验结果表明,CLDroid能有效挖掘Android源代码中的功能泄露漏洞,且具有较好的可扩展性.

References

[1]  Grace M, Zhou Y, Wang Z, et al. Systematic detection of capability leaks in stock Android smartphones[C]//Proceedings of the 19th Annual Symposium on Network and Distributed System Security. 2012.
[2]  Gibler C, Crussell J, Erickson J, et al. AndroidLeaks: automatically detecting potential privacy leaks in Android applications on a large scale[C]//Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2012: 291-307.
[3]  Mustafa T, Sohr K. Understanding the implemented access control policy of Android system services with slicing and extended static checking[EB/OL]. [2014-01-22]. http://www.informatik.uni-bremen.de/~sohr/papers/Report.pdf.
[4]  Android Open Source Project. Application fundamentals[EB/OL]. [2014-01-22]. http://developer.android.com/guide/components/fundamentals.html
[5]  Fang Z, Zhang Y, Kong Y, et al. Static detection of logic vulnerabilities in Java web applications[J/OL]. Security and Communication Networks, 2013. doi: 10.1002/sec.747, http://onlinelibrary.wiley.com/doi/10.1002/sec.747/abstract.</p>
[6]  <p> Gartner. Worldwide smartphone sales in Q<sub>3</sub> 2013[EB/OL]. [2014-1-22]. http://www.gartner.com/newsroom/id/2623415.
[7]  AppBrain. Number of available Android applications[EB/OL]. [2014-1-22]. http://www.appbrain.com/stats/.
[8]  Roman Unuchek. Obad.a trojan now being distributed via mobile botnets[EB/OL]. [2014-01-22]. http://www.securelist.com/en/blog/8131/Obad_a_Trojan_now_being_distributed_via_mobile_botnets
[9]  Chinese 3C Products Sales Promotion. Android, KungFu series variants depth analysis and complete clean-up methods[EB/OL]. [2014-01-22]. http://www.aicuxiao.org/2012/01/17/20403.html
[10]  Jiang X X. Smishing vulnerability in multiple Android platforms (including gingerbread, ice cream sandwich, and jelly bean)[EB/OL]. [2014-01-22]. http://www.csc.ncsu.edu/faculty/jiang/smishing.html.
[11]  Chan P P F, Hui L C K, Yiu S M. Droidchecker: analyzing Android applications for capability leak[C]//Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 2012: 125-136.
[12]  Davi L, Dmitrienko A, Sadeghi A R, et al. Privilege escalation attacks on Android[C]//Information Security. Springer Berlin Heidelberg, 2011: 346-360.
[13]  Felt A P, Wang H J, Moshchuk A, et al. Permission re-delegation: attacks and defenses[C]//USENIX Security Symposium. 2011.
[14]  Enck W, Octeau D, McDaniel P, et al. A study of Android application security[C]//USENIX Security Symposium. 2011.
[15]  Kim J, Yoon Y, Yi K, et al. ScanDal: Static analyzer for detecting privacy leaks in Android applications[C]//Proceedings of the Workshop on Mobile Security Technologies (MoST), in Conjunction with the IEEE Symposium on Security and Privacy. 2012.
[16]  Yang Z, Yang M, Zhang Y, et al. Appintent: Analyzing sensitive data transmission in Android for privacy leakage detection[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM, 2013: 1043-1054.
[17]  Felt A P, Chin E, Hanna S, et al. Android permissions demystified[C]//Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 2011: 627-638.
[18]  Egele M, Brumley D, Fratantonio Y, et al. An empirical study of cryptographic misuse in Android applications[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM, 2013: 73-84.
[19]  Fuchs A P, Chaudhuri A, Foster J S. SCanDroid: automated security certification of Android applications[EB/OL]. [2014-01-22]. http://www. cs. umd. edu/~avik/projects/scandroidascaa.
[20]  Enck W, Ongtang M, McDaniel P. On lightweight mobile phone application certification[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, 2009: 235-245.
[21]  Enck W, Gilbert P, Chun B G, et al. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones[C]//OSDI. 2010, 10: 255-270.
[22]  Enck W, Ongtang M, McDaniel P. Understanding Android security[J]. Security & Privacy, IEEE, 2009, 7(1): 50-57.
[23]  Jesse Burns. Developing secure mobile applications for Android [EB/OL]. [2014-01-22]. https://www.isecpartners.com/media/11991/isec_securing_android_apps.pdf.
[24]  Berger B J, Sohr K, Koschke R. Extracting and analyzing the implemented security architecture of business applications[C]//Software Maintenance and Reengineering (CSMR), 2013 17th European Conference on. IEEE, 2013: 285-294.
[25]  Weiser M. Program slicing[C]//Proceedings of the 5th lnternational Conference on Software Engineering. IEEE Press, 1981: 439-449.
[26]  Jgesser. Javaparser: a Java 1.5 parser with AST generation and visitor support[EB/OL]. [2014-01-22]. https://code.google.com/p/javaparser/.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133