Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5220/0005056301510162guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Identifying Cryptographic Functionality in Android Applications

Published: 28 August 2014 Publication History

Abstract

Mobile devices in corporate IT infrastructures are frequently used to process security-critical data. Over the past few years powerful security features have been added to mobile platforms. However, for legal and organisational reasons it is difficult to pervasively enforce using these features in consumer applications or Bring-Your-Own-Device (BYOD) scenarios. Thus application developers need to integrate custom implementations of security features such as encryption in security-critical applications. Our manual analysis of container applications and password managers has shown that custom implementations of cryptographic functionality often suffer from critical mistakes. During manual analysis, finding the custom cryptographic code was especially time consuming. Therefore, we present the Semdroid framework for simplifying application analysis of Android applications. Here, we use Semdroid to apply machine-learning techniques for detecting non-standard symmetric and asymmetric cryptography implementations. The identified code fragments can be used as starting points for subsequent manual analysis. Thus manual analysis time is greatly reduced. The capabilities of Semdroid have been evaluated on 98 password-safe applications downloaded from Google Play. Our evaluation shows the applicability of Semdroid and its potential to significantly improve future application analysis processes.

Index Terms

  1. Identifying Cryptographic Functionality in Android Applications

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ICETE 2014: Proceedings of the 11th International Joint Conference on e-Business and Telecommunications - Volume 4
    August 2014
    509 pages
    ISBN:9789897580451

    Publisher

    SCITEPRESS - Science and Technology Publications, Lda

    Setubal, Portugal

    Publication History

    Published: 28 August 2014

    Author Tags

    1. Container Applications
    2. Correct Deployment of Symmetric and Asymmetric Cryptography.
    3. Data Encryption on Mobile Devices
    4. Detection of Cryptographic Code
    5. Machine Learning
    6. Mobile Application Security
    7. Password Managers
    8. Semantic Pattern Transformation

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Nov 2024

    Other Metrics

    Citations

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media