首页> 外文期刊>Security and Communications Networks >PaddyFrog: systematically detecting confused deputy vulnerability in Android applications
【24h】

PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

机译:PaddyFrog:系统地检测Android应用程序中的混淆副漏洞

获取原文
获取原文并翻译 | 示例
       

摘要

An enormous number of applications have been developed for Android in recent years, making it one of the most popular mobile operating systems. However, it is obvious that more vulnerabilities would appear along with the booming amounts of applications. Poorly designed applications may contain security vulnerabilities that can dramatically undermine users' security and privacy. In this paper, we studied a kind of recently reported application vulnerability named confused deputy - a specific type of privilege escalation vulnerability, which can result in unauthorized operations, and so on. We proposed a novel system with code-level static analysis to analyze the applications and automatically detect possible confused deputy vulnerabilities. To tackle analysis challenges imposed by Android's component-based programming paradigm, we employed special control flow graph construction techniques to build call relations among components and function call graph within components. We developed a prototype of this system named PaddyFrog and evaluated with 7190 real world Android applications from two of the most popular markets in China. We found 1240 applications with confused deputy vulnerability and proved to be exploitable. The median execution time of this system on an application is 14.4s, which is fast enough to be used in volumes of applications testing scenarios. Copyright (c) 2015 John Wiley & Sons, Ltd.
机译:近年来,已为Android开发了大量应用程序,使其成为最受欢迎的移动操作系统之一。但是,显而易见的是,随着大量应用程序的出现,将出现更多漏洞。设计不良的应用程序可能包含安全漏洞,这些漏洞可能会严重破坏用户的安全和隐私。在本文中,我们研究了一种最近报告的应用程序漏洞,称为混淆代理-一种特殊的特权提升漏洞,它可能导致未经授权的操作,等等。我们提出了一种具有代码级静态分析的新颖系统,以分析应用程序并自动检测可能引起混淆的代理漏洞。为了解决Android基于组件的编程范例所带来的分析挑战,我们采用了特殊的控制流程图构造技术来构建组件之间的调用关系以及组件内的函数调用图。我们开发了该系统的原型PaddyFrog,并使用来自中国两个最受欢迎市场的7190个真实世界的Android应用程序进行了评估。我们发现1240个应用程序具有令人困惑的副漏洞,并被证明具有可利用性。该系统在应用程序上的中位执行时间为14.4s,该速度足以在大量应用程序测试场景中使用。版权所有(c)2015 John Wiley&Sons,Ltd.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号