Where Are We Looking for Security Concerns? Understanding Android Security Static Analysis

被引:0
作者
Schmeelk, Suzanna [1 ]
机构
[1] St Johns Univ, Queens, NY 11439 USA
来源
PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 2 | 2020年 / 1070卷
关键词
Android mobile services; Static analysis; Cyber security; Software engineering; Networking; End user services; Weakness detection; Malware prevention; Malware mitigation; Malware detection; Mobile devices; NIST Bugs Framework (BF); Mitre CAPEC; Mitre CWE;
D O I
10.1007/978-3-030-32523-7_32
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Static analysis is a traditional technique for software transformation and type analysis. Recently, static analysis has become a technique to identify cyber security vulnerabilities and malware. Specifically, static analysis has been extended into the mobile-computing arena for security-related analyses. This research examines many top security papers that are published in major conferences, journals and technical reports, and characterizes the current research characterize static analysis research. The papers identified in this paper were selected based their high citings by top research or because they introduced either a novel analysis technique or a novel security issue analysis. This research systematically constructs a static analysis landscape by charting and characterizing analysis strengths and limitations in both accuracy and security threats. The findings are reported online at www.technologyinthepark.com. This research has identified two types of static analysis motivations which affect the soundness of an analysis methodology: techniques for analyzing software for vulnerabilities and techniques used to examine applications for malware. Building on earlier research, for completeness and to aid the community by providing a coverage map, this research has connected technique motivations found to Mitre's attack taxonomy, Mitre's vulnerability taxonomy as well as the National Institute of Standards and Technology's (NIST's) Bugs Framework (BF) taxonomy. The findings include identifying vulnerabilities which are not being systematically researched.
引用
收藏
页码:467 / 483
页数:17
相关论文
共 30 条
[1]  
Androulaki E, 2010, LECT NOTES COMPUT SC, V6054, P123, DOI 10.1007/978-3-642-14992-4_12
[2]  
[Anonymous], 2004, Introduction to Computer Security
[3]  
[Anonymous], COMM ATT PATT EN CLA
[4]  
[Anonymous], 2007, COMPILERS PRINCIPLES
[5]  
Arzt S., 2014, SIGPLAN NOTICES, V49
[6]  
Bellovin S., 2016, Thinking security: Stopping next year's hackers
[7]  
Bellovin S, 2008, IEEE SECUR PRIV, V6, P88, DOI 10.1109/MSP.2008.129
[8]   Identity and Security [J].
Bellovin, Steven M. .
IEEE SECURITY & PRIVACY, 2010, 8 (02) :88-88
[9]   A Few Billion Lines of Code Later Using Static Analysis to Find Bugs in the Real World [J].
Bessey, Al ;
Block, Ken ;
Chelf, Ben ;
Chou, Andy ;
Fulton, Bryan ;
Hallem, Seth ;
Henri-Gros, Charles ;
Kamsky, Asya ;
McPeak, Scott ;
Engler, Dawson .
COMMUNICATIONS OF THE ACM, 2010, 53 (02) :66-75
[10]  
Bojanova I, 2017, 2017 IEEE 28TH ANNUAL SOFTWARE TECHNOLOGY CONFERENCE (STC)