作者: Patrick P.F. Chan , Lucas C.K. Hui , S. M. Yiu
关键词: Source lines of code 、 Android (operating system) 、 Operating system 、 Android application 、 Computer science 、 App store 、 Control flow graph 、 Taint checking 、 Exploit 、 Computer security 、 Phone
摘要: While Apple has checked every app available on the App Store, Google takes another approach that allows anyone to publish apps Android Market. The openness of Market attracts both benign and malicious developers. security platform relies mainly sandboxing applications restricting their capabilities such no application, by default, can perform any operations would adversely impact other applications, operating system, or user. However, a recent research reported genuine but vulnerable application may leak its applications. When being leveraged, gain extra which they are not granted originally. We present DroidChecker, an analyzing tool searches for aforementioned vulnerability in DroidChecker uses interprocedural control flow graph searching static taint checking detect exploitable data paths application. analyzed more than 1100 using found 6 previously unknown including re-nowned Adobe Photoshop Express have also developed exploits show is permissions, access contacts phone with just few lines code.