首页> 外文会议>2013 IEEE 7th International Conference on Software Security and Reliability Companion >Forced-Path Execution for Android Applications on x86 Platforms
【24h】

Forced-Path Execution for Android Applications on x86 Platforms

机译:在x86平台上用于Android应用程序的强制路径​​执行

获取原文
获取原文并翻译 | 示例

摘要

We present a code analysis framework that performs scalable forced-path execution of Android applications in commodity hardware. Our goal is to reveal the full application functional behavior for large commercial applications without access to source code. We do so by identifying code blocks and API calls that are deemed sensitive and provide a security report to an analyst regarding the functionality of the Android application that is under inspection. We show that our approach is scalable by allowing for the execution of each software component by numerous instances of execution modules. Each execution instance exercises a different code path through the application call-graph leading to full code and state space coverage and exposing any hidden or unwanted functionality. The output is a list of API calls, parameter values, component call graphs, and control flow graphs. We show how this can be leveraged for automated policy enforcement of runtime functionality.
机译:我们提供了一个代码分析框架,该框架可在商品硬件中执行可扩展的Android应用程序的强制路径​​执行。我们的目标是揭示大型商业应用程序的完整应用程序功能行为,而无需访问源代码。我们通过识别认为敏感的代码块和API调用来做到这一点,并向分析师提供有关正在检查的Android应用程序功能的安全报告。我们通过允许执行模块的许多实例来执行每个软件组件,证明了我们的方法是可扩展的。每个执行实例通过应用程序调用图行使不同的代码路径,从而导致完整的代码和状态空间覆盖,并公开任何隐藏的或不需要的功能。输出是API调用,参数值,组件调用图和控制流程图的列表。我们展示了如何利用它来自动执行运行时功能的策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号