DroidSearch: A tool for scaling Android app triage to real-world app stores

作者: Siegfried Rasthofer , Steven Arzt , Max Kolhagen , Brian Pfretzschner , Stephan Huber

DOI: 10.1109/SAI.2015.7237151

关键词:

摘要: The Android platform now features more than a million apps from thousands of developers. This abundance is convenient, as it caters to almost every need. But users and researchers also worry about the security trustworthiness these apps. While precise program-analysis tools are helpful in this context, unfortunately they do not scale large number present current app stores. In work we thus DroidSearch, search engine that aids multi-staged analysis which fast pre-filtering techniques allow experts quickly retrieve candidate applications should be subjected further automated and/or manual analysis. DroidSearch supported by DroidBase, middleware back-end database associates with metadata results lightweight analyses on bytecode configuration files DroidBase automatically manages executes. Experiments 235,000 six different application stores including Google Play reveal many interesting findings. For instance, identifies 40 known malware detects over 35,000 use both http https connections for accessing same resources, effectively rendering protection ineffective. It reveals 11,995 providing access potentially sensitive data through unprotected content providers.

参考文章(17)
Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis, AndRadar: Fast Discovery of Android Applications in Alternative Markets international conference on detection of intrusions and malware, and vulnerability assessment. pp. 51- 71 ,(2014) , 10.1007/978-3-319-08509-8_4
Tao Xie, Rahul Pandita, William Enck, Xusheng Xiao, Wei Yang, WHYPER: towards automating risk assessment of mobile applications usenix security symposium. pp. 527- 542 ,(2013)
Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen, AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale trust and trustworthy computing. pp. 291- 307 ,(2012) , 10.1007/978-3-642-30921-2_17
Eric Bodden, Siegfried Rasthofer, Philipp Richter, Alexander Roßnagel, Schutzmaßnahmen gegen datenschutz- unfreundliche Smartphone-Apps Datenschutz und Datensicherheit - DuD. ,vol. 37, pp. 720- 725 ,(2013) , 10.1007/S11623-013-0300-1
Damien Octeau, Yves Le Traon, Eric Bodden, Alexandre Bartel, Patrick McDaniel, Jacques Klein, Somesh Jha, Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis usenix security symposium. pp. 543- 558 ,(2013)
Johannes Hoffmann, Martin Ussath, Thorsten Holz, Michael Spreitzenbarth, Slicing droids: program slicing for smali code acm symposium on applied computing. pp. 1844- 1851 ,(2013) , 10.1145/2480362.2480706
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang, CHEX Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 229- 240 ,(2012) , 10.1145/2382196.2382223
Min Zheng, Mingshen Sun, John C.S. Lui, Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. pp. 163- 171 ,(2013) , 10.1109/TRUSTCOM.2013.25
Wu Zhou, Yajin Zhou, Michael Grace, Xuxian Jiang, Shihong Zou, Fast, scalable detection of "Piggybacked" mobile applications Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13. pp. 185- 196 ,(2013) , 10.1145/2435349.2435377
Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith, Lars Baumgärtner, Bernd Freisleben, Why eve and mallory love android Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 50- 61 ,(2012) , 10.1145/2382196.2382205