skip to main content
10.1145/2614628.2614633acmconferencesArticle/Chapter ViewAbstractPublication PagespldiConference Proceedingsconference-collections
research-article

Android taint flow analysis for app sets

Published:12 June 2014Publication History

ABSTRACT

One approach to defending against malicious Android applications has been to analyze them to detect potential information leaks. This paper describes a new static taint analysis for Android that combines and augments the FlowDroid and Epicc analyses to precisely track both inter-component and intra-component data flow in a set of Android applications. The analysis takes place in two phases: given a set of applications, we first determine the data flows enabled individually by each application, and the conditions under which these are possible; we then build on these results to enumerate the potentially dangerous data flows enabled by the set of applications as a whole. This paper describes our analysis method, implementation, and experimental results.

References

  1. E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in Android. In Proc. MobiSys, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. ECSPRIDE. DroidBench Benchmarks. Accessed 03-26-2014.Google ScholarGoogle Scholar
  3. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proc. OSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Enck, M. Ongtang, and P. D. McDaniel. Understanding Android Security. IEEE Security & Privacy, 7(1):50--57, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Proc. CCS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin. Permission Re-Delegation: Attacks and Defenses. In USENIX Security, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Fragkaki, L. Bauer, L. Jia, and D. Swasey. Modeling and enhancing Android's permission system. In Proc. ESORICS. 2012.Google ScholarGoogle ScholarCross RefCross Ref
  8. C. Fritz. FlowDroid: A Precise and Scalable Data Flow Analysis for Android. Master's thesis, TU Darmstadt, July 2013.Google ScholarGoogle Scholar
  9. C. Fritz, S. Arzt, S. Rasthofer, E. Bodden, A. Bartel, J. Klein, Y. le Traon, D. Octeau, and P. McDaniel. FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. In Proc. PLDI, 2014. To appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Hausknecht. Variability-aware Data-flow Analysis for Smartphone Applications. Master's thesis, TU Darmstadt, Sept. 2013.Google ScholarGoogle Scholar
  11. V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In Proc. USENIX Security, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang. Chex: Statically vetting Android apps for component hijacking vulnerabilities. In CCS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Octeau, S. Jha, and P. McDaniel. Retargeting Android applications to Java bytecode. In Proc. FSE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon. Effective inter-component communication mapping in Android with Epicc: An essential step towards holistic security analysis. In Proc. USENIX Security, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Rasthofer, S. Arzt, and E. Bodden. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks. In Proc. NDSS, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  16. R. Vallée-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, and V. Sundaresan. Soot - A Java bytecode optimization framework. In Proc. CASCON, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Android taint flow analysis for app sets

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SOAP '14: Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis
            June 2014
            36 pages
            ISBN:9781450329194
            DOI:10.1145/2614628

            Copyright © 2014 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 12 June 2014

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            SOAP '14 Paper Acceptance Rate5of5submissions,100%Overall Acceptance Rate11of11submissions,100%

            Upcoming Conference

            PLDI '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader