Android static taint analysis based on multi branch search association

被引:3
作者
Tang, Chenghua [1 ,3 ,4 ]
Du, Zheng [1 ]
Yang, Mengmeng [2 ]
Qiang, Baohua [1 ]
机构
[1] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Commonwealth Sci & Ind Res Org, Data61, Eveleigh, Australia
[4] Guangxi Key Lab Trusted Software, Guilin Elect Technol, Guilin 541004, Peoples R China
基金
中国国家自然科学基金;
关键词
Android application; Taint propagation; Static taint analysis; Class method call; Alias analysis;
D O I
10.1016/j.cose.2023.103186
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Taint analysis is a method used to detect system security problems by tracking the flow of user input or information leakage through the system. In the taint analysis for Android applications, the complete taint propagation path is generally obtained by tracking the taint data. There is often a compromise between efficiency and analysis accuracy in the method of obtaining the taint propagation path, or false positives and false negatives due to the neglect of Android features. Given the problems, a novel multi-branch taint search association algorithm is proposed, which optimized the processing of Android component features in taint analysis. It directly finds taint related codes and associates them according to predefined rules. It has effective Android taint analysis ability including alias analysis and reduced the negative impact of taint unrelated codes on the performance of taint analysis. At the same time, the Android static taint analysis prototype tool TaintSA is implemented based on the multi-branch taint search association algorithm. The experimental results show that TaintSA can not only ensure the analysis results' accuracy but also reduce the time and space required for taint analysis. The accuracy rate of 91.5% and the recall rate of 75.6% on the DroidBench2.0 test set are better than the taint analysis tool FlowDroid. The time consumption and memory consumption of about 30% and 20% are reduced at the same time. In terms of the representation of taint propagation edges, compared with FlowDroid, the taint propagation path output by TaintSA does not contain intermediate variables, and the form is more concise. In addition, TaintSA can output the taint propagation path without taint leakage, which is helpful for further taint analysis.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:17
相关论文
共 40 条
  • [1] Almashfi N., 2019, P 5 INT C TOOLS METH, P155, DOI [10.1007/978-3-030-71472-7_13, DOI 10.1007/978-3-030-71472-7_13]
  • [2] [Anonymous], ENISA Threat Landscape 2022'
  • [3] [Anonymous], DROIDBENCH 2 0 MICR
  • [4] AV-TEST, Malware
  • [5] Iodine: Fast Dynamic Taint Tracking Using Rollback-free Optimistic Hybrid Analysis
    Banerjee, Subarno
    Devecsery, David
    Chen, Peter M.
    Narayanasamy, Satish
    [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 490 - 504
  • [6] Chebyshev V., 2019, MOBILE MALWARE EVOLU
  • [7] Scalable Taint Specification Inference with Big Code
    Chibotaru, Victor
    Bichsel, Benjamin
    Raychev, Veselin
    Vechev, Martin
    [J]. PROCEEDINGS OF THE 40TH ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '19), 2019, : 760 - 774
  • [8] A scalable, flow-and-context-sensitive taint analysis of android applications
    Choi, Wontae
    Kannan, Jayanthkumar
    Babic, Domagoj
    [J]. JOURNAL OF COMPUTER LANGUAGES, 2019, 51 : 1 - 14
  • [9] Exploring the use of static and dynamic analysis to improve the performance of the mining sandbox approach for android malware identification
    da Costa, Francisco Handrick
    Medeiros, Ismael
    Menezes, Thales
    da Silva, Joao Victor
    da Silva, Ingrid Lorraine
    Bonifacio, Rodrigo
    Narasimhan, Krishna
    Ribeiro, Marcio
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 183
  • [10] Davanian A, 2019, PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, P31