首页> 外文会议>IEEE/ACM International Conference on Automated Software Engineering >TDroid: Exposing App Switching Attacks in Android with Control Flow Specialization
【24h】

TDroid: Exposing App Switching Attacks in Android with Control Flow Specialization

机译:TDroid:通过Control Flow Specialization公开Android中的应用程序切换攻击

获取原文

摘要

The Android multitasking mechanism can be plagued with app switching attacks, in which a malicious app replaces the legitimate top activity of the focused app with one of its own, thus mounting, e.g., phishing and denial-of-service attacks. Existing market-level defenses are still ineffective, as static analysis is fundamentally unable to reason about the intention of an app and dynamic analysis has low coverage. We introduce TDroid, a new market-level approach to detecting app switching attacks. The challenge lies in how to handle a plethora of input-dependent branch predicates (forming an exponential number of paths) that control the execution of the code responsible for launching such attacks. TDroid tackles this challenge by combining static and dynamic analysis to analyze an app without producing any false positives. In its static analysis, TDroid transforms the app into runnable slices containing potentially app switching attacks, one slice per attack. In its dynamic analysis, TDroid executes these slices on an Android phone or emulator to expose their malicious GUIs. The novelty lies in the use of a new trigger-oriented slicing technique in producing runnable slices so that certain input-dependent branch predicates are specialized to execute always some fixed branches. Evaluated with a large set of malware apps, TDroid is shown to outperform the state of the art, by detecting substantially more app switching attacks, in a few minutes per app, on average.
机译:Android多任务机制可能会受到应用程序切换攻击的困扰,其中恶意应用程序用自己的应用程序替换了重点应用程序的合法顶级活动,从而引发了例如网络钓鱼和拒绝服务攻击。现有的市场层面的防御措施仍然无效,因为静态分析从根本上无法推理出应用程序的意图,而动态分析的覆盖率却很低。我们介绍TDroid,这是一种用于检测应用程序切换攻击的新的市场级别方法。挑战在于如何处理过多的依赖输入的分支谓词(形成指数级的路径),这些谓词控制着负责发起此类攻击的代码的执行。 TDroid通过将静态和动态分析相结合来分析应用程序而不会产生任何误报,从而解决了这一难题。在静态分析中,TDroid将应用程序转换为可运行的片,其中包含潜在的应用程序切换攻击,每次攻击一个片。在动态分析中,TDroid在Android手机或仿真器上执行这些切片以公开其恶意GUI。新奇之处在于使用了一种新的面向触发的切片技术来生成可运行切片,从而使某些依赖于输入的分支谓词专门用于始终执行某些固定分支。通过大量恶意软件应用程序的评估,TDroid通过检测平均每个应用程序数分钟内的大量应用程序切换攻击,表现出比现有技术更好的性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号