首页> 外文期刊>ACM SIGPLAN Notices: A Monthly Publication of the Special Interest Group on Programming Languages >FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps
【24h】

FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps

机译:FlowDroid:针对Android应用的精确上下文,流,字段,对象敏感和生命周期感知的污染分析

获取原文
获取原文并翻译 | 示例
       

摘要

Today’s smartphones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by carelessly programmed apps that leak important data by accident, and by malicious apps that exploit their given privileges to copy such data intentionally. While existing static taint-analysis approaches have the potential of detecting such data leaks ahead of time, all approaches for Android use a number of coarse-grain approximations that can yield high numbers of missed leaks and false alarms. In this work we thus present FLOWDROID, a novel and highly precise static taint analysis for Android applications. A precise model of Android’s lifecycle allows the analysis to properly handle callbacks invoked by the Android framework, while context, flow, field and object-sensitivity allows the analysis to reduce the number of false alarms. Novel on-demand algorithms help FLOWDROID maintain high efficiency and precision at the same time. We also propose DROIDBENCH, an open test suite for evaluating the effectiveness and accuracy of taint-analysis tools specifically for Android apps. As we show through a set of experiments using SecuriBench Micro, DROIDBENCH, and a set of well-known Android test applications, FLOWDROID finds a very high fraction of data leaks while keeping the rate of false positives low. On DROIDBENCH, FLOWDROID achieves 93% recall and 86% precision, greatly outperforming the commercial tools IBM AppScan Source and Fortify SCA. FLOWDROID successfully finds leaks in a subset of 500 apps from Google Play and about 1,000 malware apps from the VirusShare project.
机译:当今的智能手机无处不在,是私人和机密数据的来源。同时,智能手机用户会受到程序编写不慎而意外泄漏重要数据的恶意应用程序以及利用其给定特权故意复制此类数据的恶意应用程序的困扰。尽管现有的静态污点分析方法有可能提前检测到此类数据泄漏,但所有适用于Android的方法都使用大量的粗粒度近似值,这些近似值可能会导致大量漏漏和误报。因此,在这项工作中,我们介绍了FLOWDROID,这是一种针对Android应用程序的新颖且高度精确的静态异味分析。精确的Android生命周期模型可以使分析正确处理由Android框架调用的回调,而上下文,流,字段和对象敏感度可以使分析减少误报的数量。新颖的按需算法可帮助FLOWDROID同时保持高效和高精度。我们还提出了DROIDBENCH,这是一个开放式测试套件,用于评估专门针对Android应用的污点分析工具的有效性和准确性。正如我们通过使用SecuriBench Micro,DROIDBENCH和一组著名的Android测试应用程序进行的实验所显示的那样,FLOWDROID发现了很大一部分数据泄漏,同时保持了较低的误报率。在DROIDBENCH上,FLOWDROID实现了93%的召回率和86%的精度,大大优于IBM AppScan Source和Fortify SCA的商业工具。 FLOWDROID成功地从Google Play的500个应用程序和VirusShare项目的大约1,000个恶意软件应用程序的子集中找到了泄漏。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号