Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2508859.2516759acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
tutorial

Easily instrumenting android applications for security purposes

Published: 04 November 2013 Publication History

Abstract

Novel types of malware on mobile devices have raised researchers interest in implementing static and dynamic techniques for detecting and mitigating malicious behavior of mobile applications. In this hands-on tutorial we will demonstrate and explain different techniques for instrumenting Android applications using the Aspect Bench Compiler (abc) and the program analysis and transformation tool Soot. Through high-level abstractions such as AspectJ aspects and Tracematches, abc supports a declarative style of instrumentation that lends itself to the rapid prototyping of at least simple instrumentation schemes. Soot supports instrumentation in an imperative style, which requires more work but allows more fine-grained control. Both abc and Soot are inter operable, as they instrument the same intermediate program representation. Furthermore, as we show, both can be easily integrated with static program analyses that can be used to specialize instrumentation schemes based on additional information extracted from the static structure of the instrumented app.

References

[1]
Chris Allan, Pavel Avgustinov, Aske Simon Christensen, Laurie Hendren, Sascha Kuzins, Jennifer Lhoták, Ond\vrej Lhoták, Oege de Moor, Damien Sereni, Ganesh Sittampalam, and Julian Tibble. abc: the aspectbench compiler for aspectj. In Proceedings of the 4th international conference on Generative Programming and Component Engineering, GPCE'05, pages 10--16, Berlin, Heidelberg, 2005. Springer-Verlag.
[2]
Chris Allan, Pavel Avgustinov, Aske Simon Christensen, Laurie Hendren, Sascha Kuzins, Ondvrej Lhoták, Oege de Moor, Damien Sereni, Ganesh Sittampalam, and Julian Tibble. Adding trace matching with free variables to aspectj. In Proceedings of the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, OOPSLA'05, pages 345--364, New York, NY, USA, 2005. ACM.
[3]
Steven Arzt, Siegfried Rasthofer, and Eric Bodden. Susi: A tool for the fully automated classification and categorization of android sources and sinks, Mai 2013.
[4]
Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, and Philipp von Styp-Rekowsky. Appguard: enforcing user requirements on android apps. In Proceedings of the 19th international conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS'13, pages 543--548, Berlin, Heidelberg, 2013. Springer-Verlag.
[5]
William Enck, Peter Gilbert, Byung gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, pages 393--407, 2010.
[6]
William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. A study of android application security. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 21--21, Berkeley, CA, USA, 2011. USENIX Association.
[7]
William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. A study of android application security. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 21--21, Berkeley, CA, USA, 2011. USENIX Association.
[8]
Christian Fritz, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves le Traon, Damien Octeau, and Patrick McDaniel. Highly precise taint analysis for android applications, Mai 2013.
[9]
Adam P Fuchs, Avik Chaudhuri, and Jeffrey S Foster. Scandroid: Automated security certification of android applications. Manuscript, Univ. of Maryland, http://www. cs. umd. edu/avik/projects/scandroidascaa, 2009.
[10]
Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao Chen. Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale. In Proceedings of the 5th international conference on Trust and Trustworthy Computing, TRUST'12, pages 291--307, Berlin, Heidelberg, 2012. Springer-Verlag.
[11]
Johannes Hoffmann, Martin Ussath, Thorsten Holz, and Michael Spreitzenbarth. Slicing droids: program slicing for smali code. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, pages 1844--1851. ACM, 2013.
[12]
Stephan Huber and Siegfried Rasthofer. Responsible disclosure: Darmstadt researchers discover security vulnerability in appguard pro.
[13]
Victor Chebyshev (Kaspersky Labs). Mobile attacks!, 2013.
[14]
Jinyung Kim, Yongho Yoon, Kwangkeun Yi, and Junbum Shin. ScanDal: Static analyzer for detecting privacy leaks in android applications. In Hao Chen, Larry Koved, and Dan S. Wallach, editors, MoST 2012: Mobile Security Technologies 2012, Los Alamitos, CA, USA, May 2012. IEEE.
[15]
Patrick Lam, Eric Bodden, Ondrej Lhotak, and Laurie Hendren. The soot framework for java program analysis: a retrospective. In Cetus Users and Compiler Infastructure Workshop (CETUS 2011), Oktober 2011.
[16]
Long Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, and Guofei Jiang. Chex: statically vetting android apps for component hijacking vulnerabilities. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS'12, pages 229--240, New York, NY, USA, 2012. ACM.
[17]
Heloise Pieterse and Martin S. Olivier. Android botnets on the rise: Trends and characteristics. In Hein S. Venter, Marianne Loock, and Marijke Coetzee, editors, ISSA, pages 1--5. IEEE, 2012.
[18]
Siegfried Rasthofer. Model Checking of Android Applications to Derive Strongest Preconditions for Secure Data Flows. Master's thesis, University of Passau, 2012.
[19]
Christian Fritz Steven Arzt and Siegfried Rasthofer. Droidbench - benchmarks, 2013.
[20]
Rubin Xu, Hassen Sadi, and Ross Anderson. Aurasium: practical policy enforcement for android applications. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, pages 27--27, Berkeley, CA, USA, 2012. USENIX Association.
[21]
Zhemin Yang and Min Yang. Leakminer: Detect information leakage on android with static taint analysis. In Third World Congress on Software Engineering (WCSE 2012), pages 101--104, 2012.
[22]
Yuanyuan Zeng, Kang G. Shin, and Xin Hu. Design of sms commanded-and-controlled and p2p-structured mobile botnets. In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC'12, pages 137--148, New York, NY, USA, 2012. ACM.
[23]
Yajin Zhou and Xuxian Jiang. Dissecting android malware: Characterization and evolution. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP'12, pages 95--109, Washington, DC, USA, 2012. IEEE Computer Society.

Cited By

View all
  • (2018)ANELProceedings of the 5th International Conference on Mobile Software Engineering and Systems10.1145/3197231.3197237(202-213)Online publication date: 27-May-2018
  • (2017)Exploring decision making with android's runtime permission dialogs using in-context surveysProceedings of the Thirteenth USENIX Conference on Usable Privacy and Security10.5555/3235924.3235940(195-210)Online publication date: 12-Jul-2017
  • (2017)The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences2017 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2017.51(1077-1093)Online publication date: May-2017
  • Show More Cited By

Index Terms

  1. Easily instrumenting android applications for security purposes

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
    November 2013
    1530 pages
    ISBN:9781450324779
    DOI:10.1145/2508859
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 November 2013

    Check for updates

    Author Tags

    1. android
    2. dynamic analysis
    3. instrumentation
    4. runtime enforcement

    Qualifiers

    • Tutorial

    Conference

    CCS'13
    Sponsor:

    Acceptance Rates

    CCS '13 Paper Acceptance Rate 105 of 530 submissions, 20%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)ANELProceedings of the 5th International Conference on Mobile Software Engineering and Systems10.1145/3197231.3197237(202-213)Online publication date: 27-May-2018
    • (2017)Exploring decision making with android's runtime permission dialogs using in-context surveysProceedings of the Thirteenth USENIX Conference on Usable Privacy and Security10.5555/3235924.3235940(195-210)Online publication date: 12-Jul-2017
    • (2017)The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences2017 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2017.51(1077-1093)Online publication date: May-2017
    • (2016)revDroidProceedings of the 11th ACM on Asia Conference on Computer and Communications Security10.1145/2897845.2897914(747-758)Online publication date: 30-May-2016
    • (2016)Extended Code Coverage for AspectJ-Based Runtime Verification ToolsRuntime Verification10.1007/978-3-319-46982-9_14(219-234)Online publication date: 20-Sep-2016
    • (2015)Android permissions remystifiedProceedings of the 24th USENIX Conference on Security Symposium10.5555/2831143.2831175(499-514)Online publication date: 12-Aug-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media