Fine-Grained In-Context Permission Classification for Android Apps using Control-Flow Graph Embedding

被引:0
|
作者
Malviya, Vikas K. [1 ]
Tun, Yan Naing [1 ]
Leow, Chee Wei [1 ]
Xynyn, Ailys Tee [1 ]
Shar, Lwin Khin [1 ]
Jiang, Lingxiao [1 ]
机构
[1] Singapore Management Univ, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
Privacy protection; Permission control; Android apps; Control flow graphs; Graph embedding; Classification; PRIVACY;
D O I
10.1109/ASE56229.2023.00056
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android is the most popular operating system for mobile devices nowadays. Permissions are a very important part of Android security architecture. Apps frequently need the users' permission, but many of them only ask for it once-when the user uses the app for the first time-and then they keep and abuse the given permissions. Longing to enhance Android permission security and users' private data protection is the driving factor behind our approach to explore fine-grained context-sensitive permission usage analysis and thereby identify misuses in Android apps. In this work, we propose an approach for classifying the fine-grained permission uses for each functionality of Android apps that a user interacts with. Our approach, named DROIDGEM, relies on mainly three technical components to provide an in-context classification for permission (mis)uses by Android apps for each functionality triggered by users: (1) static inter-procedural control-flow graphs and call graphs representing each functionality in an app that may be triggered by users' or systems' events through UI-linked event handlers, (2) graph embedding techniques converting graph structures into numerical encoding, and (3) supervised machine learning models classifying (mis)uses of permissions based on the embedding. We have implemented a prototype of DROIDGEM and evaluated it on 89 diverse apps. The results show that DROIDGEM can accurately classify whether permission used by the functionality of an app triggered by a UI-linked event handler is a misuse in relation to manually verified decisions, with up to 95% precision and recall. We believe that such a permission classification mechanism can be helpful in providing fine-grained permission notices in a context related to app users' actions, and improving their awareness of (mis)uses of permissions and private data in Android apps.
引用
收藏
页码:1225 / 1237
页数:13
相关论文
共 25 条
  • [11] ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity
    Li, Jinfeng
    Chen, Liwei
    Shi, Gang
    Chen, Kai
    Meng, Dan
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (11) : 3165 - 3176
  • [12] Fine-grained information flow control using attributes
    Han, Jinguang
    Chen, Liqun
    Susilo, Willy
    Huang, Xinyi
    Castiglione, Aniello
    Liang, Kaitai
    INFORMATION SCIENCES, 2019, 484 : 167 - 182
  • [13] IBV-CFI: Efficient fine-grained control-flow integrity preserving CFG precision
    Jang, Hyerean
    Park, Moon Chan
    Lee, Dong Hoon
    COMPUTERS & SECURITY, 2020, 94
  • [14] Random CFI (RCFI): Efficient Fine-Grained Control-Flow Integrity Through Random Verification
    Park, Moon Chan
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON COMPUTERS, 2021, 70 (05) : 733 - 745
  • [15] TrustFlow-X: A Practical Framework for Fine-grained Control-flow Integrity in Critical Systems
    Bresch, Cyril
    Hely, David
    Lysecky, Roman
    Chollet, Stephanie
    Parissis, Ioannis
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2020, 19 (05)
  • [16] DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification
    Han, Xinbo
    Xu, Guizhong
    Zhang, Meng
    Yang, Zheng
    Yu, Ziyang
    Huang, Weiqing
    Meng, Chen
    COMPUTER NETWORKS, 2024, 245
  • [17] Practical Fine-Grained Information Flow Control Using Laminar
    Porter, Donald E.
    Bond, Michael D.
    Roy, Indrajit
    McKinley, Kathryn S.
    Witchel, Emmett
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2015, 37 (01):
  • [18] Fine-Grained Access Control for Hybrid Mobile Applications in Android Using Restricted Paths
    Pooryousef, Shahrooz
    Amini, Morteza
    2016 13TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2016, : 85 - 90
  • [19] Foundation for Fine-Grained Security and DRM Control Based on a Service Call Graph Context Identification
    Su, Ziyi
    Biennier, Frederique
    ENTERPRISE INFORMATION SYSTEMS, ICEIS 2013, 2014, 190 : 226 - 241
  • [20] Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS (vol 2018, 3130652, 2018)
    Qiang, Weizhong
    Wang, Shizhen
    Jin, Hai
    Zhong, Jiangying
    SECURITY AND COMMUNICATION NETWORKS, 2018,