首页> 外文会议>IEEE International Symposium on Software Reliability Engineering >Correlating UI Contexts with Sensitive API Calls: Dynamic Semantic Extraction and Analysis
【24h】

Correlating UI Contexts with Sensitive API Calls: Dynamic Semantic Extraction and Analysis

机译:将UI上下文与敏感的API调用相关联:动态语义提取和分析

获取原文

摘要

The Android framework provides sensitive APIs for Android apps to access the user’s private information, e.g., SMS, call logs and locations. Whether a sensitive API call in an app is legitimate or not depends on whether the app has provided enough natural-language semantics to reflect the need for the permission. The prior efforts on analyzing description-to-permission fidelity in an app are all static. Some check whether the permissions requested (or sensitive APIs used) by the app are consistent with the functionalities described by the app. These app-level techniques are too coarse-grained, as they cannot tell if a sensitive API call under a certain runtime context, such as a UI state, is legitimate or not. Others attempt to establish this connection by performing a data-flow analysis, but such finegrained API-level static analyses are too imprecise to handle a variety of dynamic language features used in Android apps, including dynamic class loading, reflection and code obfuscation.We introduce APICOG, an automated fine-grained API-level approach, representing the first dynamic description-to-permission fidelity analysis for an Android app that can check if a sensitive API call is legitimate or not under a given runtime context. APICOG relates each sensitive API call with a UI state, called its UI context, under which the call is made via dynamic analysis and then extracts the text-based semantics for each UI context from its associated text- and image-typed attributes by applying a natural language processing (NLP) technique. Finally, APICOG relies on machine-learning to deduce if a sensitive API call under a UI context is legitimate or not. We have evaluated APICOG with thousands of Android apps drawn from a third-party market and a malware dataset, achieving an accuracy of 97.7%, a precision of 94.1% and a recall of 92.8% overall, outperforming the prior art in all the three metrics.
机译:Android框架为Android应用程序提供了敏感的API,以访问用户的私人信息,例如SMS,通话记录和位置。应用程序中的敏感API调用是否合法取决于该应用程序是否提供了足够的自然语言语义来反映对权限的需求。分析应用程序中描述到权限的保真度的先前努力都是静态的。有些人检查应用程序请求的权限(或使用的敏感API)是否与应用程序描述的功能一致。这些应用程序级技术过于粗糙,因为它们无法确定在特定运行时上下文(例如UI状态)下的敏感API调用是否合法。其他人试图通过执行数据流分析来建立这种连接,但是这种细粒度的API级静态分析太不精确,无法处理Android应用程序中使用的各种动态语言功能,包括动态类加载,反射和代码混淆。 APICOG是一种自动细粒度的API级别的方法,代表了Android应用程序的第一个动态描述到权限保真度分析,可以在给定的运行时上下文下检查敏感的API调用是否合法。 APICOG将每个敏感的API调用与一个UI状态(称为其UI上下文)相关联,在该状态下通过动态分析进行调用,然后通过应用关联的文本和图像类型属性​​从每个UI上下文中提取基于文本的语义。自然语言处理(NLP)技术。最后,APICOG依靠机器学习来推断UI上下文下的敏感API调用是否合法。我们已经使用来自第三方市场的数千个Android应用程序和恶意软件数据集对APICOG进行了评估,其准确性为97.7%,准确性为94.1%,召回率总体为92.8%,在所有这三个指标中均优于现有技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号