Skip to main content

2018 | OriginalPaper | Buchkapitel

AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications

verfasst von : Hongliang Liang, Yudong Wang, Tianqi Yang, Yue Yu

Erschienen in: Secure IT Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy leak of mobile applications has been a major issue in mobile security, and the prevalent usage of packing technology in mobile applications further complicates the problem and renders many existing analysis tools incapacitated. In this paper, we propose AppLance, a novel lightweight analysis system for Android packed applications without prior unpacking, which can also consider implicit information flow and privacy confusion. Without modifying Android system and the applications, AppLance runs on a mobile device as a dynamic analysis system, subtly evading the impact of various packing methods. Moreover, we build and release a benchmark, which contains 540 Android applications, to evaluate analysis tools aimed at packed applications. We evaluate AppLance on the benchmark and real-world applications, and the experimental results show that the system is effective and can be deployed on real devices with little overhead.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
As an important component in ART, dex2oat converts dex files into oat files.
 
2
Instrument refers to obtaining the control flow and data flow information of the program by inserting the probe into the target program and executing the probe.
 
3
To avoid potential interference from other applications, a single application is run each time in Android6.0 with AppLance.
 
Literatur
1.
Zurück zum Zitat Alazab, M., Moonsamy, V., Batten, L.M., Lantz, P., Tian, R.: Analysis of malicious and benign Android applications. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 608–616 (2012) Alazab, M., Moonsamy, V., Batten, L.M., Lantz, P., Tian, R.: Analysis of malicious and benign Android applications. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 608–616 (2012)
4.
Zurück zum Zitat Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In: PLDI (2014) Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In: PLDI (2014)
5.
Zurück zum Zitat Backes, M., Bugiel, S., Schranz, O., von Styp-Rekowsky, P., Weisgerber, S.: Artist: the Android runtime instrumentation and security toolkit. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 481–495 (2017) Backes, M., Bugiel, S., Schranz, O., von Styp-Rekowsky, P., Weisgerber, S.: Artist: the Android runtime instrumentation and security toolkit. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 481–495 (2017)
7.
Zurück zum Zitat Duan, Y., et al.: Things you may not know about Android (un) packers : a systematic study based on whole-system emulation (2017) Duan, Y., et al.: Things you may not know about Android (un) packers : a systematic study based on whole-system emulation (2017)
9.
Zurück zum Zitat Enck, W., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32, 5:1–5:29 (2010)CrossRef Enck, W., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32, 5:1–5:29 (2010)CrossRef
11.
Zurück zum Zitat Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in Android applications on a large scale. In: TRUST (2012) Gibler, C., Crussell, J., Erickson, J., Chen, H.: AndroidLeaks: automatically detecting potential privacy leaks in Android applications on a large scale. In: TRUST (2012)
13.
Zurück zum Zitat Gordon, M.I., Kim, D., Perkins, J.H., Gilham, L., Nguyen, N., Rinard, M.C.: Information flow analysis of Android applications in DroidSafe. In: NDSS (2015) Gordon, M.I., Kim, D., Perkins, J.H., Gilham, L., Nguyen, N., Rinard, M.C.: Information flow analysis of Android applications in DroidSafe. In: NDSS (2015)
15.
Zurück zum Zitat Jiang, Z., Zhou, A., Liu, L., Jia, P.L., Liu, L., Zuo, Z.: CrackDex: universal and automatic DEX extraction method. In: 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 53–60 (2017) Jiang, Z., Zhou, A., Liu, L., Jia, P.L., Liu, L., Zuo, Z.: CrackDex: universal and automatic DEX extraction method. In: 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 53–60 (2017)
17.
Zurück zum Zitat Kim, D., Kwak, J., Ryou, J.: DWroidDump: executable code extraction from Android applications for malware analysis. IJDSN 11, 379682:1–379682:9 (2015)CrossRef Kim, D., Kwak, J., Ryou, J.: DWroidDump: executable code extraction from Android applications for malware analysis. IJDSN 11, 379682:1–379682:9 (2015)CrossRef
19.
Zurück zum Zitat Li, J., Ye, Y., Zhou, Y., Ma, J.: CodeTracker: a lightweight approach to track and protect authorization codes in SMS messages. IEEE Access 6, 10107–10120 (2018)CrossRef Li, J., Ye, Y., Zhou, Y., Ma, J.: CodeTracker: a lightweight approach to track and protect authorization codes in SMS messages. IEEE Access 6, 10107–10120 (2018)CrossRef
20.
Zurück zum Zitat Li, L., et al.: IccTA: detecting inter-component privacy leaks in Android apps. In: 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 280–291 (2015) Li, L., et al.: IccTA: detecting inter-component privacy leaks in Android apps. In: 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, vol. 1, pp. 280–291 (2015)
21.
Zurück zum Zitat Li, L., Bissyandé, T.F., Octeau, D., Klein, J.: DroidRA: taming reflection to support whole-program analysis of Android apps. In: ISSTA (2016) Li, L., Bissyandé, T.F., Octeau, D., Klein, J.: DroidRA: taming reflection to support whole-program analysis of Android apps. In: ISSTA (2016)
22.
Zurück zum Zitat Li, Y., Yang, Z., Guo, Y., Chen, X.: DroidBot: a lightweight UI-guided test input generator for Android. In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), pp. 23–26 (2017) Li, Y., Yang, Z., Guo, Y., Chen, X.: DroidBot: a lightweight UI-guided test input generator for Android. In: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), pp. 23–26 (2017)
23.
Zurück zum Zitat Ning, Z., Zhang, F.: DexLego: reassembleable bytecode extraction for aiding static analysis. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 690–701 (2018) Ning, Z., Zhang, F.: DexLego: reassembleable bytecode extraction for aiding static analysis. In: 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 690–701 (2018)
25.
Zurück zum Zitat Qian, C., Luo, X., Shao, Y., Chan, A.T.S.: On tracking information flows through JNI in Android applications. In: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 180–191 (2014) Qian, C., Luo, X., Shao, Y., Chan, A.T.S.: On tracking information flows through JNI in Android applications. In: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 180–191 (2014)
27.
Zurück zum Zitat Rastogi, V., Chen, Y., Enck, W.: AppsPlayground: automatic security analysis of smartphone applications. In: CODASPY (2013) Rastogi, V., Chen, Y., Enck, W.: AppsPlayground: automatic security analysis of smartphone applications. In: CODASPY (2013)
28.
Zurück zum Zitat Rastogi, V., Qu, Z., McClurg, J., Cao, Y., Chen, Y.: Uranine: real-time privacy leakage monitoring without system modification for Android. In: SecureComm (2015) Rastogi, V., Qu, Z., McClurg, J., Cao, Y., Chen, Y.: Uranine: real-time privacy leakage monitoring without system modification for Android. In: SecureComm (2015)
29.
Zurück zum Zitat Reaves, B., et al.: *droid: assessment and evaluation of Android application analysis tools. ACM Comput. Surv. 49, 55:1–55:30 (2016) Reaves, B., et al.: *droid: assessment and evaluation of Android application analysis tools. ACM Comput. Surv. 49, 55:1–55:30 (2016)
30.
Zurück zum Zitat Schreckling, D., Posegga, J., Köstler, J., Schaff, M.: Kynoid: real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android. In: WISTP (2012) Schreckling, D., Posegga, J., Köstler, J., Schaff, M.: Kynoid: real-time enforcement of fine-grained, user-defined, and data-centric security policies for Android. In: WISTP (2012)
31.
Zurück zum Zitat Schütte, J., Titze, D., Fuentes, J.M.D.: AppCaulk: data leak prevention by injecting targeted taint tracking into Android apps. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 370–379 (2014) Schütte, J., Titze, D., Fuentes, J.M.D.: AppCaulk: data leak prevention by injecting targeted taint tracking into Android apps. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 370–379 (2014)
32.
Zurück zum Zitat Spreitzenbarth, M., Schreck, T., Echtler, F., Arp, D., Hoffmann, J.: Mobile-sandbox: combining static and dynamic analysis with machine-learning techniques. Int. J. Inf. Secur. 14, 141–153 (2014)CrossRef Spreitzenbarth, M., Schreck, T., Echtler, F., Arp, D., Hoffmann, J.: Mobile-sandbox: combining static and dynamic analysis with machine-learning techniques. Int. J. Inf. Secur. 14, 141–153 (2014)CrossRef
33.
Zurück zum Zitat Sun, M., Wei, T., Lui, J.C.S.: TaintART: a practical multi-level information-flow tracking system for Android runtime. In: ACM Conference on Computer and Communications Security (2016) Sun, M., Wei, T., Lui, J.C.S.: TaintART: a practical multi-level information-flow tracking system for Android runtime. In: ACM Conference on Computer and Communications Security (2016)
34.
Zurück zum Zitat Tam, K., Feizollah, A., Anuar, N.B., Salleh, R., Cavallaro, L.: The evolution of Android malware and Android analysis techniques. ACM Comput. Surv. 49, 76:1–76:41 (2017)CrossRef Tam, K., Feizollah, A., Anuar, N.B., Salleh, R., Cavallaro, L.: The evolution of Android malware and Android analysis techniques. ACM Comput. Surv. 49, 76:1–76:41 (2017)CrossRef
35.
Zurück zum Zitat Tam, K., Khan, S.J., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of Android malware behaviors. In: NDSS (2015) Tam, K., Khan, S.J., Fattori, A., Cavallaro, L.: CopperDroid: automatic reconstruction of Android malware behaviors. In: NDSS (2015)
36.
Zurück zum Zitat Vidas, T., Christin, N.: Evading Android runtime analysis via sandbox detection. In: AsiaCCS (2014) Vidas, T., Christin, N.: Evading Android runtime analysis via sandbox detection. In: AsiaCCS (2014)
37.
Zurück zum Zitat Xu, R., Saïdi, H., Anderson, R.J.: Aurasium: practical policy enforcement for Android applications. In: Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, 8–10 August 2012, pp. 539–552 (2012) Xu, R., Saïdi, H., Anderson, R.J.: Aurasium: practical policy enforcement for Android applications. In: Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, 8–10 August 2012, pp. 539–552 (2012)
38.
Zurück zum Zitat Xue, L., Luo, X., Yu, L., Wang, S., Wu, D.: Adaptive unpacking of Android apps. In: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), pp. 358–369 (2017) Xue, L., Luo, X., Yu, L., Wang, S., Wu, D.: Adaptive unpacking of Android apps. In: 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE), pp. 358–369 (2017)
39.
Zurück zum Zitat Xue, L., Zhou, Y., Chen, T., Luo, X., Gu, G.: Malton: towards on-device non-invasive mobile malware analysis for art. In: USENIX Security Symposium (2017) Xue, L., Zhou, Y., Chen, T., Luo, X., Gu, G.: Malton: towards on-device non-invasive mobile malware analysis for art. In: USENIX Security Symposium (2017)
40.
Zurück zum Zitat Yan, L.K., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. In: USENIX Security Symposium (2012) Yan, L.K., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. In: USENIX Security Symposium (2012)
41.
Zurück zum Zitat Yang, W., et al.: AppSpear: bytecode decrypting and DEX reassembling for packed Android malware. In: RAID (2015)CrossRef Yang, W., et al.: AppSpear: bytecode decrypting and DEX reassembling for packed Android malware. In: RAID (2015)CrossRef
42.
Zurück zum Zitat Yerima, S.Y., Sezer, S., Muttik, I.: High accuracy Android malware detection using ensemble learning. IET Inf. Secur. 9, 313–320 (2015)CrossRef Yerima, S.Y., Sezer, S., Muttik, I.: High accuracy Android malware detection using ensemble learning. IET Inf. Secur. 9, 313–320 (2015)CrossRef
45.
Zurück zum Zitat Zhou, Y., Jiang, X.: Dissecting Android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95–109 (2012) Zhou, Y., Jiang, X.: Dissecting Android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy, pp. 95–109 (2012)
Metadaten
Titel
AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications
verfasst von
Hongliang Liang
Yudong Wang
Tianqi Yang
Yue Yu
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-03638-6_4

Premium Partner