A Static Analysis Model for Implicit Information Leakage in Android Application

被引:0
|
作者
Cao, Hongsheng [1 ]
Jiao, Jian [1 ]
Li, Denghui [2 ]
机构
[1] Beijing Informat Sci & Technol Univ, Sch Comp Sci, Beijing Key Lab Internet Culture & Digital Dissem, Beijing, Peoples R China
[2] Giant Interact Grp Inc, Shanghai, Peoples R China
来源
2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT) | 2018年
关键词
Android application; implicit information flow; structure-related flow model; information leak; mobile security;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The privacy information leakage can be divided into explicit and implicit information leakage. The detection of IIF (implicit information flow) is an important task in Android Security research. The IIF mechanisms are significantly different from traditional information leakage, because implicit information leakage adopted program structural changes in the way information is leaked. We find the correlation between basic blocks, control structures and expressions of the three different levels objects, proposal SRFM (Structure-Related Flow Model) to describe the relationship between the implicit flow and the control structure. A prototype system TSDroid (Structure-Related Flow Droid) is developed. The experiment shows that TSDroid can detect the implicit information leakage with more efficiency and higher precision than other traditional methods.
引用
收藏
页码:1133 / 1140
页数:8
相关论文
共 33 条
  • [21] NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps
    Wang, Jikai
    Wang, Haoyu
    PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 2024, : 971 - 982
  • [22] Requirements Analysis of Android Application Using Activity Theory: A Case Studyac
    Ahmad, Nik Azlina Nik
    Akhbariee, Noorul Izathool
    2013 INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2013, : 145 - 149
  • [23] Forensic analysis of TikTok application to seek digital artifacts on Android smartphone
    Nghi Hoang Khoa
    Phan The Duy
    Hien Do Hoang
    Do Thi Thu Hien
    Van-Hau Pham
    2020 RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES (RIVF 2020), 2020, : 342 - 346
  • [24] User interface-level QoE analysis for Android application tuning
    Lee, Seokjun
    Cha, Hojung
    PERVASIVE AND MOBILE COMPUTING, 2017, 40 : 382 - 396
  • [25] Analysis of Android Application Component Exposure Vulnerability Based on Machine Learning
    Shao S.
    Wang M.-L.
    Chen D.-Q.
    Wang T.
    Jiang X.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (09): : 974 - 977
  • [26] Android Application Risk Indicator Based on Feature Analysis Utilizing Machine Learning
    Baek, Hyochang
    Joo, Minhee
    Park, Won
    You, Youngin
    Lee, Kyungho
    2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 50 - 54
  • [27] Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning
    Molina-Coronado, Borja
    Mori, Usue
    Mendiburu, Alexander
    Miguel-Alonso, Jose
    COMPUTERS & SECURITY, 2023, 124
  • [28] Educational Content Analysis of The Most Popular Game in Android Application Based on Play Store Version
    Prameswari, N. S.
    Suharto, M.
    Sumarni, S.
    Maryono, D.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ARTS AND CULTURE (ICONARC 2018), 2018, 276 : 145 - 148
  • [29] Poster: Android Whole-System Control Flow Analysis for Accurate Application Behavior Modeling
    Nguyen Huu Hoang
    MOBISYS'16: COMPANION COMPANION PUBLICATION OF THE 14TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2016, : 30 - 30
  • [30] VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique
    Nirumand, Atefeh
    Zamani, Bahman
    Ladani, Behrouz Tork
    SOFTWARE-PRACTICE & EXPERIENCE, 2019, 49 (01) : 70 - 99