Effective Real-time Android Application Auditing

被引:60
作者
Xia, Mingyuan [1 ]
Gong, Lu [2 ]
Lyu, Yuanhao [2 ]
Qi, Zhengwei [2 ]
Liu, Xue [1 ]
机构
[1] McGill Univ, Montreal, PQ H3A 2T5, Canada
[2] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
来源
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 | 2015年
关键词
approximated execution; program analysis; privacy; mobile application;
D O I
10.1109/SP.2015.60
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile applications can access both sensitive personal data and the network, giving rise to threats of data leaks. App auditing is a fundamental program analysis task to reveal such leaks. Currently, static analysis is the de facto technique which exhaustively examines all data flows and pinpoints problematic ones. However, static analysis generates false alarms for being over-estimated and requires minutes or even hours to examine a real app. These shortcomings greatly limit the usability of automatic app auditing. To overcome these limitations, we design AppAudit that relies on the synergy of static and dynamic analysis to provide effective real-time app auditing. AppAudit embodies a novel dynamic analysis that can simulate the execution of part of the program and perform customized checks at each program state. AppAudit utilizes this to prune false positives of an efficient but over-estimating static analysis. Overall, AppAudit makes app auditing useful for app market operators, app developers and mobile end users, to reveal data leaks effectively and efficiently. We apply AppAudit to more than 1,000 known malware and 400 real apps from various markets. Overall, AppAudit reports comparative number of true data leaks and eliminates all false positives, while being 8.3x faster and using 90% less memory compared to existing approaches. AppAudit also uncovers 30 data leaks in real apps. Our further study reveals the common patterns behind these leaks: 1) most leaks are caused by 3rd-party advertising modules; 2) most data are leaked with simple unencrypted HTTP requests. We believe AppAudit serves as an effective tool to identify data-leaking apps and provides implications to design promising runtime techniques against data leaks.
引用
收藏
页码:899 / 914
页数:16
相关论文
共 32 条
[1]  
Ali K, 2012, LECT NOTES COMPUT SC, V7313, P688, DOI 10.1007/978-3-642-31057-7_30
[2]  
[Anonymous], 2013, Proceedings of the 22Nd USENIX Conference on Security, SEC'13
[3]  
[Anonymous], 2011, USENIX SECURITY S
[4]  
[Anonymous], 2012, P 10 INT C MOB SYST
[5]  
[Anonymous], P 21 USENIX C SEC S
[6]  
[Anonymous], 2013, P 29 ANN COMPUTER SE
[7]  
[Anonymous], 2014, Communications of the ACM, DOI DOI 10.1145/2494522
[8]  
[Anonymous], 2013, Proceedings of the 29th Annual Computer Security Applications Conference
[9]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[10]  
Bush WR, 2000, SOFTWARE PRACT EXPER, V30, P775, DOI 10.1002/(SICI)1097-024X(200006)30:7<775::AID-SPE309>3.0.CO