ViaLin: Path-Aware Dynamic Taint Analysis for Android

被引:2
作者
Ahmed, Khaled [1 ]
Wang, Yingying [1 ]
Lis, Mieszko [1 ]
Rubin, Julia [1 ]
机构
[1] Univ British Columbia, Vancouver, BC, Canada
来源
PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023 | 2023年
关键词
Dynamic taint analysis; path tracking; Android;
D O I
10.1145/3611643.3616330
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Dynamic taint analysis - a program analysis technique that checks whether information flows between particular source and sink locations in the program, has numerous applications in security, program comprehension, and software testing. Specifically, in mobile software, taint analysis is often used to determine whether mobile apps contain stealthy behaviors that leak user-sensitive information to unauthorized third-party servers. While a number of dynamic taint analysis techniques for Android software have been recently proposed, none of them are able to report the complete information propagation path, only reporting flow endpoints, i.e., sources and sinks of the detected information flows. This design optimizes for runtime performance and allows the techniques to run efficiently on a mobile device. Yet, it impedes the applicability and usefulness of the techniques: an analyst using the tool would need to manually identify information propagation paths, e.g., to determine whether information was properly handled before being released, which is a challenging task in large real-world applications. In this paper, we address this problem by proposing a dynamic taint analysis technique that reports accurate taint propagation paths. We implement it in a tool, VIALIN, and evaluate it on a set of existing benchmark applications and on 16 large Android applications from the Google Play store. Our evaluation shows that VIALIN accurately detects taint flow paths while running on a mobile device with a reasonable time and memory overhead.
引用
收藏
页码:1598 / 1610
页数:13
相关论文
共 54 条
[1]   MANDOLINE: Dynamic Slicing of Android Applications with Trace-Based Alias Analysis [J].
Ahmed, Khaled ;
Lis, Mieszko ;
Rubin, Julia .
2021 14TH IEEE CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2021), 2021, :105-115
[2]  
Ahmed Khaled, 2023, Supplementary Materials
[3]  
[Anonymous], Avoid Hard-coded JWT Secret Keys
[4]  
[Anonymous], ICC-Bench
[5]  
[Anonymous], Malicious WhatsApp Mod Distributed Through Legitimate Apps
[6]  
[Anonymous], DroidBench 3.0
[7]  
[Anonymous], JWT Hardcoded Secret Key
[8]   FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole-System Dynamic Information Flow Tracking [J].
Arefi, Meisam Navaki ;
Alexander, Geoffrey ;
Rokham, Hooman ;
Chen, Aokun ;
Faloutsos, Michalis ;
Wei, Xuetao ;
Oliveira, Daniela Seabra ;
Crandall, Jedidiah R. .
2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, :231-242
[9]  
Arzt S., 2017, Ph.D. Thesis
[10]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]