Skip to main content

2017 | OriginalPaper | Buchkapitel

An Improved Android Collusion Attack Detection Method Based on Program Slicing

verfasst von : Yunhao Liu, Xiaohong Li, Zhiyong Feng, Jianye Hao

Erschienen in: Formal Methods and Software Engineering

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Android applications can leak sensitive information through collusion, which gives the smartphone users a great security risk. We propose an Android collusion attack detection method based on control flow and data flow analysis. This method gives analysis of data propagation between different applications firstly. And then, a multi-apps program slice model based on both data and control flow are given. Last, the privacy data leakage paths of multi-apps are computed by reaching-definition analysis. Meanwhile, the criterions of mobile device information leakage edge are redefined according to the correlation of mobile devices. Based on the above principle, we implemented an Android collusion attack sensitive information leakage detection tools called CollusionDetector. Case study is carried out for typical collusion attack scenarios and it can obtain better results than existing tools and methods. Experiments show that the analysis of control flow can more accurately find the path of privacy propagation, and more effectively to identify collusion attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346–360. Springer, Heidelberg (2011). doi:10.1007/978-3-642-18178-8_30 CrossRef Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346–360. Springer, Heidelberg (2011). doi:10.​1007/​978-3-642-18178-8_​30 CrossRef
3.
Zurück zum Zitat Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Traon, Y.L., Octeau, D., Mcdaniel, P.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Not. 49(6), 259–269 (2014)CrossRef Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Traon, Y.L., Octeau, D., Mcdaniel, P.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM Sigplan Not. 49(6), 259–269 (2014)CrossRef
4.
Zurück zum Zitat Babil, G.S., Mehani, O., Boreli, R., Kaafar, M.A.: On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices. In: International Conference on Security and Cryptography, pp. 1–8 (2013) Babil, G.S., Mehani, O., Boreli, R., Kaafar, M.A.: On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices. In: International Conference on Security and Cryptography, pp. 1–8 (2013)
5.
Zurück zum Zitat Cavallaro, L., Saxena, P., Sekar, R.: Anti-taint-analysis: practical evasion techniques against information flow based malware defense. Stony Brook University (2007) Cavallaro, L., Saxena, P., Sekar, R.: Anti-taint-analysis: practical evasion techniques against information flow based malware defense. Stony Brook University (2007)
6.
Zurück zum Zitat Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 143–163. Springer, Heidelberg (2008). doi:10.1007/978-3-540-70542-0_8 CrossRef Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 143–163. Springer, Heidelberg (2008). doi:10.​1007/​978-3-540-70542-0_​8 CrossRef
7.
Zurück zum Zitat Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. Plant Soil 269(1–2), 309–320 (2011) Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. Plant Soil 269(1–2), 309–320 (2011)
8.
Zurück zum Zitat Einarsson, A., Nielsen, J.D.: A survivor’s guide to java program analysis with soot. Notes from Department of Computer Science (2008) Einarsson, A., Nielsen, J.D.: A survivor’s guide to java program analysis with soot. Notes from Department of Computer Science (2008)
9.
Zurück zum Zitat Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification (2009) Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification (2009)
10.
Zurück zum Zitat Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., Mcdaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: USENIX Conference on Operating Systems Design and Implementation, pp. 99–106 (2010) Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., Mcdaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: USENIX Conference on Operating Systems Design and Implementation, pp. 99–106 (2010)
11.
Zurück zum Zitat Fuchs, A.P., Chaudhuri, A., Foster, J.S.: Scandroid: automated security certification of android applications (2009) Fuchs, A.P., Chaudhuri, A., Foster, J.S.: Scandroid: automated security certification of android applications (2009)
12.
Zurück zum Zitat Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291–307. Springer, Heidelberg (2012). doi:10.1007/978-3-642-30921-2_17 CrossRef Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 291–307. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-30921-2_​17 CrossRef
13.
Zurück zum Zitat Graa, M., Cuppens-Boulahia, N., Cuppens, F., Cavalli, A.: Detecting control flow in smarphones: combining static and dynamic analyses. In: Xiang, Y., Lopez, J., Kuo, C.-C.J., Zhou, W. (eds.) CSS 2012. LNCS, vol. 7672, pp. 33–47. Springer, Heidelberg (2012). doi:10.1007/978-3-642-35362-8_4 CrossRef Graa, M., Cuppens-Boulahia, N., Cuppens, F., Cavalli, A.: Detecting control flow in smarphones: combining static and dynamic analyses. In: Xiang, Y., Lopez, J., Kuo, C.-C.J., Zhou, W. (eds.) CSS 2012. LNCS, vol. 7672, pp. 33–47. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-35362-8_​4 CrossRef
14.
Zurück zum Zitat Horwitz, S., Reps, T., Binkley, D.: Interprocedural slicing using dependence graphs. In: ACM Sigplan 1988 Conference on Programming Language Design and Implementation, pp. 35–46 (1988) Horwitz, S., Reps, T., Binkley, D.: Interprocedural slicing using dependence graphs. In: ACM Sigplan 1988 Conference on Programming Language Design and Implementation, pp. 35–46 (1988)
16.
Zurück zum Zitat Li, L., Bartel, A., Bissyandé, T.F., Klein, J., Traon, Y.L.: ApkCombiner: combining multiple android apps to support inter-app analysis. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 513–527. Springer, Cham (2015). doi:10.1007/978-3-319-18467-8_34 CrossRef Li, L., Bartel, A., Bissyandé, T.F., Klein, J., Traon, Y.L.: ApkCombiner: combining multiple android apps to support inter-app analysis. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 513–527. Springer, Cham (2015). doi:10.​1007/​978-3-319-18467-8_​34 CrossRef
17.
Zurück zum Zitat Li, L., Bartel, A., Klein, J., Traon, Y.L., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., Mcdaniel, P.: IccTA: detecting inter-component privacy leaks in android apps. In: IEEE/ACM IEEE International Conference on Software Engineering, pp. 280–291 (2015) Li, L., Bartel, A., Klein, J., Traon, Y.L., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D., Mcdaniel, P.: IccTA: detecting inter-component privacy leaks in android apps. In: IEEE/ACM IEEE International Conference on Software Engineering, pp. 280–291 (2015)
18.
Zurück zum Zitat Octeau, D., Mcdaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., Traon, Y.L.: Effective inter-component communication mapping in android with epicc: an essential step towards holistic security analysis. In: USENIX Conference on Security, pp. 543–558 (2013) Octeau, D., Mcdaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., Traon, Y.L.: Effective inter-component communication mapping in android with epicc: an essential step towards holistic security analysis. In: USENIX Conference on Security, pp. 543–558 (2013)
19.
Zurück zum Zitat Rashidi, B., Fung, C.: A survey of android security threats and defenses. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 6, 3–35 (2015) Rashidi, B., Fung, C.: A survey of android security threats and defenses. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 6, 3–35 (2015)
20.
Zurück zum Zitat Reps, T., Horwitz, S., Sagiv, M.: Precise interprocedural dataflow analysis via graph reachability. In: POPL 1995, vol. 167(96), pp. 49–61 (1995). Lecture Notes in Computer Science Reps, T., Horwitz, S., Sagiv, M.: Precise interprocedural dataflow analysis via graph reachability. In: POPL 1995, vol. 167(96), pp. 49–61 (1995). Lecture Notes in Computer Science
21.
Zurück zum Zitat Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: Security and Privacy, pp. 317–331 (2010) Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: Security and Privacy, pp. 317–331 (2010)
22.
Zurück zum Zitat Wargo, J.M.: Phonegap Essentials: Building Cross-platform Mobile Apps. Pearson Schweiz AG, Zug (2012) Wargo, J.M.: Phonegap Essentials: Building Cross-platform Mobile Apps. Pearson Schweiz AG, Zug (2012)
23.
Zurück zum Zitat Wei, F., Roy, S., Ou, X., Robby.: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 1329–1341 (2014) Wei, F., Roy, S., Ou, X., Robby.: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of android apps. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 1329–1341 (2014)
24.
Zurück zum Zitat Weiser, M.: Program slicing. In: International Conference on Software Engineering, pp. 439–449 (1981) Weiser, M.: Program slicing. In: International Conference on Software Engineering, pp. 439–449 (1981)
25.
Zurück zum Zitat Wu, L., Grace, M., Zhou, Y., Wu, C., Jiang, X.: The impact of vendor customizations on android security. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 623–634 (2013) Wu, L., Grace, M., Zhou, Y., Wu, C., Jiang, X.: The impact of vendor customizations on android security. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 623–634 (2013)
26.
Zurück zum Zitat Xing, L., Pan, X., Wang, R., Yuan, K., Wang, X.F.: Upgrading your android, elevating my malware: privilege escalation through mobile OS updating. In: IEEE Symposium on Security and Privacy, pp. 393–408 (2014) Xing, L., Pan, X., Wang, R., Yuan, K., Wang, X.F.: Upgrading your android, elevating my malware: privilege escalation through mobile OS updating. In: IEEE Symposium on Security and Privacy, pp. 393–408 (2014)
Metadaten
Titel
An Improved Android Collusion Attack Detection Method Based on Program Slicing
verfasst von
Yunhao Liu
Xiaohong Li
Zhiyong Feng
Jianye Hao
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68690-5_19

Premium Partner