首页> 外文期刊>IEEE transactions on mobile computing >Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation
【24h】

Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation

机译:禁止辅助和上下文迁移的Android框架易受攻击和漏洞生成的象征性

获取原文
获取原文并翻译 | 示例
           

摘要

Android Application Framework is an integral and foundational part of the Android system. Each of the two billion (as of 2017) Android devices relies on the systemservices of Android Framework to manage applications and system resources. Given its critical role, a vulnerability in the framework can be exploited to launch large-scale cyber attacks and cause severe harms to user security and privacy. Recently, many vulnerabilities in Android Framework were exposed, showing that it is indeed vulnerable and exploitable. While there is a large body of studies on Android application analysis, research on Android Framework analysis is very limited. In particular, to our knowledge, there is no prior work that investigates how to enable symbolic execution of the framework, an approach that has proven to be very powerful for vulnerability discovery and exploit generation. We design and build the first system, CENTAUR, that enables symbolic execution of Android Framework. Due to the middleware nature and technical peculiarities of the framework that impinge on the analysis, many unique challenges arise and are addressed in CENTAUR. The systemhas been applied to discovering new vulnerability instances, which can be exploited by recently uncovered attacks against the framework, and to generating PoC exploits.
机译:Android应用程序框架是Android系统的一个积分和基础部分。每次20亿(截至2017年)Android设备依赖于Android框架的SystemService来管理应用程序和系统资源。鉴于其关键作用,可以利用框架中的漏洞来启动大规模的网络攻击,并对用户安全性和隐私造成严重危害。最近,许多漏洞在Android框架中被暴露,表明它确实易受攻击和利用。虽然有一个大型的Android应用分析研究,但有关Android框架分析的研究非常有限。特别是我们的知识,没有先前的工作,调查如何启用框架的象征性,这是一种证明对于漏洞发现和利用生成非常强大的方法。我们设计并构建第一个系统,中心,即支持Android框架的象征性。由于框架的中间件性质和技术特性,在分析中受到影响,因此出现了许多独特的挑战,并以中心为中心解决。系统已应用于发现新的漏洞实例,这些情况可以通过最近发现对框架的攻击以及生成POC漏洞来利用。

著录项

  • 来源
    《IEEE transactions on mobile computing》 |2020年第12期|2946-2964|共19页
  • 作者单位

    Univ South Carolina Dept Comp Sci & Engn Columbia SC 29208 USA;

    Univ South Carolina Dept Comp Sci & Engn Columbia SC 29208 USA;

    Penn State Univ Coll Informat Sci & Technol University Pk PA 16802 USA;

    Chinese Acad Sci Inst Informat Engn Beijing 100012 Peoples R China|Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China;

    Chinese Acad Sci Inst Informat Engn Beijing 100012 Peoples R China|Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China;

    Chinese Acad Sci Inst Informat Engn Beijing 100012 Peoples R China|Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China;

    Chinese Acad Sci Inst Informat Engn Beijing 100012 Peoples R China|Univ Chinese Acad Sci Sch Cyber Secur Beijing 100049 Peoples R China;

    Fudan Univ Sch Comp Sci Shanghai 200433 Peoples R China;

    Penn State Univ Coll Informat Sci & Technol University Pk PA 16802 USA;

    Penn State Univ Coll Informat Sci & Technol University Pk PA 16802 USA;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Symbolic execution; concolic execution; vulnerability discovery; exploit generation; android framework;

    机译:象征性执行;Concolic执行;漏洞发现;利用一代;Android框架;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号