Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps

作者: Yuan Zhang , Min Yang , Zhemin Yang , Guofei Gu , Peng Ning

DOI: 10.1109/TIFS.2014.2347206

关键词:

摘要: The android platform adopts permissions to protect sensitive resources from untrusted apps. However, after are granted by users at install time, apps could use these (sensitive resources) with no further restrictions. Thus, recent years have witnessed the explosion of undesirable behaviors in Android An important part defense is accurate analysis traditional syscall-based techniques not well-suited for Android, because they capture critical interactions between application and system. This paper presents VetDroid, a dynamic generally analyzing novel permission perspective. VetDroid proposes systematic technique effectively construct behaviors, i.e., how applications access (sensitive) system resources, acquired permission-sensitive utilized application. With security analysts can easily examine internal an app. Using real-world malware, we show that clearly reconstruct fine-grained malicious ease malware analysis. We apply 1249 top free Google Play. assist finding more information leaks than TaintDroid, state-of-the-art technique. In addition, analyze causes TaintDroid cannot reveal. Finally, help identify subtle vulnerabilities some (top free) otherwise hard detect.

参考文章(51)
Devdatta Akhawe, Matthew Finifter, Adrienne Porter Felt, David Wagner, Serge Egelman, How to ask for permission usenix conference on hot topics in security. pp. 7- 7 ,(2012)
Kapil Singh, Practical Context-Aware Permission Control for Hybrid Mobile Applications recent advances in intrusion detection. pp. 307- 327 ,(2013) , 10.1007/978-3-642-41284-4_16
Tao Xie, Rahul Pandita, William Enck, Xusheng Xiao, Wei Yang, WHYPER: towards automating risk assessment of mobile applications usenix security symposium. pp. 527- 542 ,(2013)
Sahin Albayrak, Karsten Raddatz, Seyit A. Camtepe, Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Google Android : a comprehensive introduction School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty. ,(2009)
Adrienne Porter Felt, Kate Greenwood, David Wagner, The effectiveness of application permissions usenix conference on web application development. pp. 7- 7 ,(2011)
Lorenzo Cavallaro, Prateek Saxena, R. Sekar, On the Limits of Information Flow Techniques for Malware Analysis and Containment international conference on detection of intrusions and malware and vulnerability assessment. pp. 143- 163 ,(2008) , 10.1007/978-3-540-70542-0_8
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov, Learning and Classification of Malware Behavior international conference on detection of intrusions and malware and vulnerability assessment. pp. 108- 125 ,(2008) , 10.1007/978-3-540-70542-0_6
Shashi Shekhar, Michael Dietz, Anhei Shu, Dan S. Wallach, Yuliy Pisetsky, Quire: lightweight provenance for smart phone operating systems usenix security symposium. pp. 23- 23 ,(2011)
Babil Golam Sarwar, Olivier Mehani, Roksana Boreli, Mohamed-Ali Kaafar, None, On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices international conference on security and cryptography. pp. 461- 468 ,(2013)