FlowCog: Context-Aware Semantic Extraction and Analysis of Information Flow Leaks in Android Apps

被引:1
作者
Du, Xuechao [1 ]
Pan, Xiang [2 ]
Cao, Yinzhi [3 ]
He, Boyuan [4 ]
Fan, Gan [5 ]
Chen, Yan [4 ]
Xu, Daigang [6 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Zhejiang, Peoples R China
[2] Google Inc, Mountain View, CA 94043 USA
[3] Johns Hopkins Univ, Dept Comp Sci, Baltimore, MD 20218 USA
[4] Northwestern Univ, Dept Elect Engn & Comp Sci, Evanston, IL 60208 USA
[5] Palo Alto Networks, Santa Clara, CA 95054 USA
[6] ZTE Corp, Shenzhen 518057, Guangdong, Peoples R China
关键词
Android; information leakage; semantic extraction; natural language processing;
D O I
10.1109/TMC.2022.3197638
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android apps having access to private information may be legitimate, depending on whether the app provides users enough semantics to justify the access. Existing works analyzing app semantics are coarse-grained, staying on the app-level. They can only identify whether an app, as a whole, should request special permission but cannot answer whether a specific app behavior under a particular runtime context, such as information flow, is correctly justified. We propose FlowCog, an automated system to extract semantics related to information flows and correlate such semantics with given information flows to address these issues. Particularly, FlowCog statically finds all the Android views related to the given flow via control or data dependencies and then extracts semantics, such as texts and images, from these views and associated layouts. Next, FlowCog adopts natural language processing and deep learning approaches to infer whether the extracted semantics correlate with the given flow. Our evaluation shows that FlowCog can achieve an accuracy rate of 95.4% and an F-1 score of 0.953.
引用
收藏
页码:6460 / 6476
页数:17
相关论文
共 58 条
  • [1] Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
  • [2] Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness
    Allen, Joey
    Landen, Matthew
    Chaba, Sanya
    Ji, Yang
    Chung, Simon Pak Ho
    Lee, Wenke
    [J]. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 210 - 221
  • [3] [Anonymous], 1998, Technical Report 1998-4
  • [4] [Anonymous], Beautiful Soup Documentation-Beautiful Soup 4.9.0 documentation
  • [5] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [6] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
  • [7] Brown TB, 2020, ADV NEUR IN, V33
  • [8] EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework
    Cao, Yinzhi
    Fratantonio, Yanick
    Bianchi, Antonio
    Egele, Manuel
    Kruegel, Christopher
    Vigna, Giovanni
    Chen, Yan
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [9] Chin E., 2011, P 9 INT C MOB SYST A, P239, DOI DOI 10.1145/1999995.2000018
  • [10] Devlin J, 2019, Arxiv, DOI arXiv:1810.04805