B-droid: A Static Taint Analysis Framework for Android Applications

被引:0
|
作者
ALmotairy, Rehab [1 ]
Daadaa, Yassine [1 ]
机构
[1] Al Imam Mohammad Ibn Saud Islamic Univ IMSIU, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
Static analysis; taint analysis; fuzz testing; android applications; mobile malwares; data flow analysis;
D O I
10.14569/IJACSA.2021.0120150
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Android is currently the most popular smartphone operating system in use, with its success attributed to the large number of applications available from the Google Play Store. However, these contain issues relating to the storage of the user's sensitive data, including contacts, location, and the phone's unique identifier (DIED. Use of these applications therefore risks exfiltration of this data, including unauthorized tracking of users' behavior and violation of their privacy. Sensitive data leaks are currently detected with taint analysis approaches. This paper addresses these issues by proposing a new static taint analysis framework specifically for Android platforms, termed "B-Droid". B-Droid is based on static taint analysis using a large set of sources and sinks techniques, side by side with the fuzz testing concept, in order to detect privacy leaks, whether malicious or unintentional by analyses the behavior of Applications Under Test (AUTs). This has the potential to offer improved precision in comparison to earlier approaches. To ensure the quality of our analysis, we undertook an evaluation testing a variety of Android applications installed on a mobile after filtering according to the relevant permissions. We found that B-Droid efficiently detected five of the most prevalent commercial spyware applications on the market, as well as issuing an immediate warning to the user, so that they can decide not to continue with the AUTs. This paper provides a detailed analysis of this method, along with its implementation and results.
引用
收藏
页码:421 / 430
页数:10
相关论文
共 50 条
  • [1] JNFuzz-Droid: a lightweight fuzzing and taint analysis framework for native code of Android applications
    Jianchao Cao
    Fan Guo
    Yanwen Qu
    Empirical Software Engineering, 2025, 30 (5)
  • [2] A Taint Analysis Framework Applied to Android Applications in the Packed State
    Bai, Shouying
    Ma, Lu
    Ma, Huan
    Liu, Wei
    CHINA COMMUNICATIONS, 2023, 20 (03) : 336 - 346
  • [3] An efficient approach for taint analysis of android applications
    Zhang, Jie
    Tian, Cong
    Duan, Zhenhua
    COMPUTERS & SECURITY, 2021, 104
  • [4] FastDroid: Efficient Taint Analysis for Android Applications
    Zhang, Jie
    Tian, Cong
    Duan, Zhenhua
    2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2019), 2019, : 236 - 237
  • [5] Taint Analysis of Arrays in Android Applications
    Maalouf, Assad
    Lu, Lunjin
    36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 893 - 899
  • [6] Taint Analysis Tool of Android Applications Based on Tainted Value Graph
    Zhang J.
    Tian C.
    Duan Z.-H.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (06): : 1701 - 1716
  • [7] HybriDroid: Static Analysis Framework for Android Hybrid Applications
    Lee, Sungho
    Dolby, Julian
    Ryu, Sukyoung
    2016 31ST IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2016, : 250 - 261
  • [8] Android Static Taint Analysis of Dynamic Loading and Reflection Mechanism
    Yue H.
    Zhang Y.
    Wang W.
    Liu Q.
    1600, Science Press (54): : 313 - 327
  • [9] Tailoring Taint Analysis for Database Applications in the K Framework
    Alam, Md Imran
    Halder, Raju
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, TECHNOLOGY AND APPLICATIONS (DATA), 2021, : 370 - 377
  • [10] Static Analysis of Memory Leak in Android Applications
    Zhou, Di
    Fu, Zhengyu
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 1023 - 1027