B-droid: A Static Taint Analysis Framework for Android Applications

被引:0
|
作者
ALmotairy, Rehab [1 ]
Daadaa, Yassine [1 ]
机构
[1] Al Imam Mohammad Ibn Saud Islamic Univ IMSIU, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
Static analysis; taint analysis; fuzz testing; android applications; mobile malwares; data flow analysis;
D O I
10.14569/IJACSA.2021.0120150
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Android is currently the most popular smartphone operating system in use, with its success attributed to the large number of applications available from the Google Play Store. However, these contain issues relating to the storage of the user's sensitive data, including contacts, location, and the phone's unique identifier (DIED. Use of these applications therefore risks exfiltration of this data, including unauthorized tracking of users' behavior and violation of their privacy. Sensitive data leaks are currently detected with taint analysis approaches. This paper addresses these issues by proposing a new static taint analysis framework specifically for Android platforms, termed "B-Droid". B-Droid is based on static taint analysis using a large set of sources and sinks techniques, side by side with the fuzz testing concept, in order to detect privacy leaks, whether malicious or unintentional by analyses the behavior of Applications Under Test (AUTs). This has the potential to offer improved precision in comparison to earlier approaches. To ensure the quality of our analysis, we undertook an evaluation testing a variety of Android applications installed on a mobile after filtering according to the relevant permissions. We found that B-Droid efficiently detected five of the most prevalent commercial spyware applications on the market, as well as issuing an immediate warning to the user, so that they can decide not to continue with the AUTs. This paper provides a detailed analysis of this method, along with its implementation and results.
引用
收藏
页码:421 / 430
页数:10
相关论文
共 50 条
  • [21] Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection
    Molina-Coronado, Borja
    Ruggia, Antonio
    Mori, Usue
    Merlo, Alessio
    Mendiburu, Alexander
    Miguel-Alonso, Jose
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 235
  • [22] Static Analysis of Context Leaks in Android Applications
    Toffalini, Flavio
    Sun, Jun
    Ochoa, Martin
    2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - SOFTWARE ENGINEERING IN PRACTICE TRACK (ICSE-SEIP 2018), 2018, : 215 - 224
  • [23] Comparative Analysis of Two Approaches to Static Taint Analysis
    M. V. Belyaev
    N. V. Shimchik
    V. N. Ignatyev
    A. A. Belevantsev
    Programming and Computer Software, 2018, 44 : 459 - 466
  • [24] Comparative Analysis of Two Approaches to Static Taint Analysis
    Belyaev, M. V.
    Shimchik, N. V.
    Ignatyev, V. N.
    Belevantsev, A. A.
    PROGRAMMING AND COMPUTER SOFTWARE, 2018, 44 (06) : 459 - 466
  • [25] Analyzing Android Taint Analysis Tools: FlowDroid, Amandroid, and DroidSafe
    Zhang, Junbin
    Wang, Yingying
    Qiu, Lina
    Rubin, Julia
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (10) : 4014 - 4040
  • [26] Algebraic-Datatype Taint Tracking, with Applications to Understanding Android Identifier Leaks
    Rahaman, Sydur
    Neamtiu, Iulian
    Yin, Xin
    PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 70 - 82
  • [27] A Qualitative Analysis of Android Taint-Analysis Results
    Luo, Linghui
    Bodden, Eric
    Spath, Johannes
    34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 102 - 114
  • [28] Practical static analysis of context leaks in Android applications
    Toffalini, Flavio
    Sun, Jun
    Ochoa, Martin
    SOFTWARE-PRACTICE & EXPERIENCE, 2019, 49 (02) : 233 - 251
  • [29] Carraybound: Static Array Bounds Checking in C Programs Based on Taint Analysis
    Gao, Fengjuan
    Chen, Tianjiao
    Wang, Yu
    Situ, Lingyun
    Wang, Linzhang
    Li, Xuandong
    8TH ASIA-PACIFIC SYMPOSIUM ON INTERNETWARE (INTERNETWARE 2016), 2016, : 81 - 90
  • [30] Towards Bridging the Gap Between Dalvik Bytecode and Native Code During Static Analysis of Android Applications
    Lantz, Patrik
    Johansson, Bjorn
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 587 - 593