期刊文献+

InsightDroid-动态追踪Android应用方法 被引量:1

InsightDroid—Dynamic Method Trace in Android Applications
下载PDF
导出
摘要 随着Android平台的快速发展,第三方应用出现大量安全漏洞.一般而言,作为应用分析的第一步,研究人员需要运行Android应用观察其运行时特征.然而,现有的动态分析方法如Taint Droid,必须运行于定制的沙盒环境中,鲁棒性和兼容性存在局限.本文提出一种动态分析系统——Insight Droid,该系统使用动态插桩技术追踪目标应用的成员方法,以帮助研究人员洞悉应用运行时特征对应的本质代码.作者已在多个设备的不同Android版本中成功加载了Insight Droid,证明该系统相较TaintDroid而言,拥有更好的兼容性.此外,选取了10个闭源应用和50个开源应用对Insight Droid进行评估,结果表明Insight Droid可以成功追踪目标应用的方法并有效反馈敏感API的调用,追踪成功率分别为100%和83%. With the rapid development of Android platform, there are many security vulnerabilities in the alternative applications. As the first step of applications analysis, generally, researchers would like to observe applications'runtime features dynamically. However, traditional dynamic analysis methods such as TaintDroid, are required to work in a custom sandbox and have limitation in robustness and compatibility. This paper presents InsightDroid, a dynamic analysis system using dynamic instrumentation technique for tracing tar- get methods to help researchers having insight into Android applications'runtime features. The authors evaluate InsightDroid on differ- ent devices with multiple Android versions to prove that the system has better compatibility than TaintDroid. They also present an eval- uation of InsightDroid with 10 closed source applications, as well as 50 open source applications. The results show that InsightDroid can trace methods of target applications successfully and notify users effectively when some sensitive APIs are invoked. The success rates are 100% and 83% respectively.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第11期2482-2487,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61373006)资助
关键词 安卓应用 动态分析 动态插桩 方法追踪 权限映射 android application dynamic analysis dynamic instrumentation method trace permission map
  • 相关文献

参考文献13

  • 1Willam Enck, Damien Octeau, Patrick McDaniel, et al. A study of android application security [ C ]. In: SEC' 11, Proceedings of the 20th USENIX Conference on Security ,2011:21-21.
  • 2Vaibhav Rastogi, Chen Yan, Jiang Xu-xian. Droidch-ameleon: evalua- ting android antimalware against transformation attacks [ C ]. In: ASIACCS'13 ,Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security ,2013:329-334.
  • 3Willam Enck, Damien Octeau, Patrick McDaniel. Onlightweight mobile phone application certification[ C ]. In : CCS'09,Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009 : 235 -245.
  • 4Erika Chin, Adrienne Porter-felt, Kate Greenwood, et al. Analyzing interapplication communication in Android [ C ]. In : MobiSys' 11, Proceedings of the 9th International Conference on Mobile Sys- tems, Applications and Services,2011:239-252.
  • 5Vaibhav Rastogi, Chen Yah, Willam Enck. AppsPlayground: anto- matic security analysis of smartphone applications [ C ]. In: CO- DASPY'I3 ,Proceedings of the third ACM Conference on Data and Application Security and Privacy,2013:209-220.
  • 6Zhou Ya-jin, Jiang Xu-xian. Dissecting android malware: character- ization and evolution [ C ]. In : SP' 12, Security and Privacy ( SP), 2012 IEEE Symposium on,2012:95-109.
  • 7Willam Enck, Peter Gilbert, et al. TaintDroid: an information flow tracking system for realtime privacy monitoring on srnartphones [ C ]. Proceedings of the 9th USENIX Conference on Operating Sys- terns Design and Implementation ( OSDI'10 ) ,2010:1-6.
  • 8Adrienne Porter-felt, Erika Chin, Steve Hanna, et al. Android per- missions demystified [ C]. In: CCS' 11, Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011:627-638.
  • 9TaintDroid. Realtime Privacy Monitoring on Smartph ones [ EB/ OL ]. http ://www. appanalysis, org,2014-04.
  • 10Xposed. Xda Developers [ EB/OL ]. http ://forum. xdadevelopers. corn/showthread, php? t = 1574401,2013-12.

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部