VDetector: Detecting vulnerability based on inter-component data flows in Android applications

被引:1
作者
Huang, Kun [1 ]
Liu, Xuchong [2 ]
Wang, Weiping [1 ]
Wang, Haodong [3 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha, Peoples R China
[2] Hunan Police Acad, Dept Informat Technol, Changsha, Peoples R China
[3] Cleveland State Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44115 USA
来源
2019 15TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2019) | 2019年
基金
中国国家自然科学基金;
关键词
Android security; vulnerability detection; data flow tracking;
D O I
10.1109/MSN48538.2019.00067
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the popularity of Android devices and the improvement of intelligence of mobile phones, our life becomes more and more convenient. Meanwhile, the popularity brings new challenges to Android security, especially the application vulnerabilities. These vulnerabilities may lead to sensitive data leaks. To address this issue, researchers have proposed methods to detect the vulnerabilities in Android applications. But most of them only detect one type of vulnerabilities. In this paper, we propose VDetector, a data flow tracking based method for detecting three types of vulnerabilities, Log Leak Vulnerability, Content Provider Vulnerability, and Inter-Components Communication Vulnerability. Based on the reasons of the three types of vulnerabilities, VDetector transforms the detection into the data flow tracking. We first extend the source and sink sets corresponding to the vulnerabilities. Then we explore whether there are paths between the sources and the sinks. If there are paths, it indicates that the vulnerabilities exist. At last, three datasets are used for experiments and the result indicates that VDetector effectively finds such android application vulnerabilities above.
引用
收藏
页码:321 / 326
页数:6
相关论文
共 20 条
[1]  
Aliju, ANN MOBILE SAFETY RE
[2]  
Aliju Security, OP PLATF AL
[3]  
[Anonymous], 2013, P 20 NETW DISTR SYST
[4]  
[Anonymous], 2011, USENIX SEC S
[5]  
Anzhuo, ANRUAN MARK
[6]  
IccTA, DAT ICCRE
[7]  
KLIEBER W., 2014, Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis, P1
[8]   IccTA: Detecting Inter-Component Privacy Leaks in Android Apps [J].
Li, Li ;
Bartel, Alexandre ;
Bissyande, Tegawende F. ;
Klein, Jacques ;
Le Traon, Yves ;
Arzt, Steven ;
Rasthofer, Siegfried ;
Bodden, Eric ;
Octeau, Damien ;
McDaniel, Patrick .
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, :280-291
[9]   An Empirical Study on Android-related Vulnerabilities [J].
Linares-Vasquez, Mario ;
Bavota, Gabriele ;
Escobar-Velasquez, Camilo .
2017 IEEE/ACM 14TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2017), 2017, :2-13
[10]   Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers [J].
Luo, Meng ;
Starov, Oleksii ;
Honarmand, Nima ;
Nikiforakis, Nick .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :149-162