首页> 外文期刊>Software >VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique
【24h】

VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique

机译:VAnDroid:使用模型驱动的逆向工程技术对Android应用程序进行漏洞分析的框架

获取原文
获取原文并翻译 | 示例
           

摘要

Android is extensively used worldwide by mobile application developers. Android provides applications with a message passing system to communicate within and between them. Due to the risks associated with this system, it is vital to detect its unsafe operations and potential vulnerabilities. To achieve this goal, a new framework, called VAnDroid, based on Model Driven Reverse Engineering (MDRE), is presented that identifies security risks and vulnerabilities related to the Android application communication model. In the proposed framework, some security-related information included in an Android app is automatically extracted and represented as a domain-specific model. Then, it is used for analyzing security configurations and identifying vulnerabilities in the corresponding application. The proposed framework is implemented as an Eclipse-based tool, which automatically identifies the Intent Spoofing and Unauthorized Intent Receipt as two attacks related to the Android application communication model. To evaluate the tool, it has been applied to several real-world Android applications, including 20 apps from Google Play and 110 apps from the F-Droid repository. VAnDroid is also compared with several existing analysis tools, and it is shown that it has a number of key advantages over those tools specifically regarding its high correctness, scalability, and usability in discovering vulnerabilities. The results well indicate the effectiveness and capacity of the VAnDroid as a promising approach in the field of Android security.
机译:Android在全球范围内被移动应用程序开发人员广泛使用。 Android为应用程序提供了消息传递系统,以在应用程序内部和之间进行通信。由于此系统存在风险,因此检测其不安全操作和潜在漏洞至关重要。为了实现此目标,提出了一个基于模型驱动逆向工程(MDRE)的名为VAnDroid的新框架,该框架可识别与Android应用程序通信模型相关的安全风险和漏洞。在提出的框架中,会自动提取Android应用程序中包含的一些与安全相关的信息,并将其表示为特定于域的模型。然后,它用于分析安全配置并识别相应应用程序中的漏洞。所提出的框架被实现为基于Eclipse的工具,该工具自动将Intent Spoofing和Unauthorized Intent Receipt识别为与Android应用程序通信模型相关的两种攻击。为了评估该工具,该工具已应用于多个实际的Android应用程序,包括Google Play的20个应用程序和F-Droid存储库的110个应用程序。 VAnDroid还与几种现有分析工具进行了比较,结果表明,与这些工具相比,VAnDroid具有许多关键优势,特别是在其正确性,可伸缩性和发现漏洞的可用性方面。结果很好地表明了VAnDroid作为Android安全领域中一种有前途的方法的有效性和容量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号