首页> 外文会议>IEEE International Conference on Software Security and Reliability Companion >Forced-Path Execution for Android Applications on x86 Platforms
【24h】

Forced-Path Execution for Android Applications on x86 Platforms

机译:在X86平台上为Android应用程序执行强制路径执行

获取原文

摘要

We present a code analysis framework that performs scalable forced-path execution of Android applications in commodity hardware. Our goal is to reveal the full application functional behavior for large commercial applications without access to source code. We do so by identifying code blocks and API calls that are deemed sensitive and provide a security report to an analyst regarding the functionality of the Android application that is under inspection. We show that our approach is scalable by allowing for the execution of each software component by numerous instances of execution modules. Each execution instance exercises a different code path through the application call-graph leading to full code and state space coverage and exposing any hidden or unwanted functionality. The output is a list of API calls, parameter values, component call graphs, and control flow graphs. We show how this can be leveraged for automated policy enforcement of runtime functionality.
机译:我们提出了一种代码分析框架,在商品硬件中执行可扩展的强制路径​​执行Android应用程序。我们的目标是揭示大型商业应用程序的完整应用程序功能,而无需访问源代码。我们通过识别被视为敏感的代码块和API调用,并为分析师提供关于正在检查的Android应用程序的功能的安全报告。我们表明我们的方法是通过允许通过许多执行模块执行每个软件组件来缩放。每个执行实例通过应用程序呼叫图练习不同的代码路径,导致完整的代码和状态空间覆盖并暴露任何隐藏或不需要的功能。输出是API调用,参数值,组件调用图和控制流程图的列表。我们展示如何为运行时功能的自动策略执行如何利用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号