Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis

被引:0
作者
Nguyen Tan Cam [1 ]
Van-Hau Pham [2 ]
Tuan Nguyen [2 ]
机构
[1] Hoa Sen Univ, Fac Sci & Technol, Ho Chi Minh City, Vietnam
[2] Vietnam Natl Univ, Univ Informat Technol, Fac Comp Network & Commun, Ho Chi Minh City, Vietnam
来源
INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017 | 2017年 / 424卷
关键词
Android security; Hybrid analysis; Inter-application communication; Sensitive data leakage detection;
D O I
10.1007/978-981-10-4154-9_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile malwares (especially spyware) target heavily Android operating system. Data is leaked if it exists a sensitive data flow (Data propagation from sensitive source to critical sink). Usually, a sensitive data flow is executed by a chain of actions. In most cases, sensitive data flows are begun and finished in the same application. However, there exist cases where these flows can pass to multi-applications by using inter-application communication. Standalone application analysis can not detect such data flows. Static analysis faces limitations when malware code is obfuscated. Besides, certain actions only take place when receiving input from user. It means that the information related to sensitive data flows is depended on the input data. Which is not available at analysis time when using static analysis technique. In this study, we propose uitHyDroid system that allows to detect sensitive data leakage via multi-applications by using hybrid analysis. uitHyDroid uses static analysis to collect sensitive data flows in each application. Meanwhile, dynamic analysis is used to capture inter-application communications. In this study, to evaluate our approach, we use the extended of DroidBench dataset and applications downloaded from GooglePlay. The experimental results show that almost of sensitive data leakages in the first dataset are correctly detected. Beside that, the proposed system detects several malwares in real-world applications.
引用
收藏
页码:298 / 305
页数:8
相关论文
共 19 条
  • [1] [Anonymous], 2016, SELENDROID SELENDROI
  • [2] [Anonymous], 2015, SEMANTEC 2015 INTERN, V20
  • [3] [Anonymous], 2016, SYMANTEC INTERNET SE, V21
  • [4] [Anonymous], UI APPL EXERCISER MO
  • [5] [Anonymous], 2009, SCANDROID AUTOMATED
  • [6] [Anonymous], 2016, Xposed framework
  • [7] Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
  • [8] Azim T, 2013, ACM SIGPLAN NOTICES, V48, P641, DOI [10.1145/2509136.2509549, 10.1145/2544173.2509549]
  • [9] Enck W., 2010, Communications of the ACM, V10, P1, DOI DOI 10.1145/2494522
  • [10] KLIEBER W., 2014, Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis, P1