Computational Soundness for Dalvik Bytecode

被引:2
作者
Backes, Michael [1 ,2 ]
Kunnemann, Robert [1 ]
Mohammadi, Esfandiar [3 ]
机构
[1] Univ Saarland, CISPA, Saarland Informat Campus, D-66123 Saarbrucken, Germany
[2] MPI SWS, Saarland Informat Campus, Saarbrucken, Germany
[3] Swiss Fed Inst Technol, Zurich, Switzerland
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
关键词
Android; Computational Soundness; Secure Information Flow;
D O I
10.1145/2976749.2978418
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automatically analyzing information flow within Android applications that rely on cryptographic operations with their computational security guarantees imposes formidable challenges that existing approaches for understanding an app's behavior struggle to meet. These approaches do not distinguish cryptographic and non-cryptographic operations, and hence do not account for cryptographic protections: f(m) is considered sensitive for a sensitive message m irrespective of potential secrecy properties offered by a cryptographic operation f. These approaches consequently provide a safe approximation of the app's behavior, but they mistakenly classify a large fraction of apps as potentially insecure and consequently yield overly pessimistic results. In this paper, we show how cryptographic operations can be faithfully included into existing approaches for automated app analysis. To this end, we first show how cryptographic operations can be expressed as symbolic abstractions within the comprehensive Dalvik bytecode language. These abstractions are accessible to automated analysis and can be conveniently added to existing app analysis tools using minor changes in their semantics. Second, we show that our abstractions are faithful by providing the first computational soundness result for Dalvik bytecode, i.e., the absence of attacks against our symbolically abstracted program entails the absence of any attacks against a suitable cryptographic program realization. We cast our computational soundness result in the CoSP framework, which makes the result modular and composable.
引用
收藏
页码:717 / 730
页数:14
相关论文
共 36 条
[1]  
Aizatulin M., 2012, P 2012 ACM C COMPUTE, P712
[2]   Cryptographically-masked flows [J].
Askarov, Aslan ;
Hedin, Daniel ;
Sabelfeld, Andrei .
THEORETICAL COMPUTER SCIENCE, 2008, 402 (2-3) :82-101
[3]  
Backes M., 2016, P ACM ASIACCS
[4]  
Backes M., 2014, LNCS, V8414, P42
[5]  
Backes M., 2016, ARXIV160804362
[6]   Symbolic Malleable Zero-knowledge Proofs [J].
Backes, Michael ;
Bendun, Fabian ;
Maffei, Matteo ;
Mohammadi, Esfandiar ;
Pecina, Kim .
2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, :412-426
[7]  
Backes M, 2013, LECT NOTES COMPUT SC, V7796, P206, DOI 10.1007/978-3-642-36830-1_11
[8]   Computationally Sound Verification of Source Code [J].
Backes, Michael ;
Maffei, Matteo ;
Unruh, Dominique .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :387-398
[9]  
Backes M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P66
[10]  
Backes Michael., 2012, P 2012 ACM C COMPUTE, P699