期刊文献+

基于静态污点分析的Android应用Intent注入漏洞检测方法 被引量:6

Approach of Android Applications Intent Injection Vulnerability Detection Based on Static Taint Analysis
下载PDF
导出
摘要 针对Android应用程序组件间通信过程中的消息载体Intent有可能被攻击者构造进而引发组件被恶意注入的安全风险问题,提出了一种基于静态污点分析的检测方法。在构建Android应用的函数调用图和控制流图的基础上,通过跟踪应用组件内和组件间不可信Intent消息的污点传播过程,检测应用中潜在的Intent注入漏洞。用该方法对4类标准测试应用和50款第三方应用进行测试,实验结果表明了该方法的可行性和有效性。 As a message carrier in the process of component communication of Android application, Intent can be mal- formed by an attacker, leading to security risk of malicious component injection. A detection approach based on static taint analysis was presented. On the basis of building call graph and control flow graph of Android application,by tracking the taint propagation with in and between components, the potential Intent injection vulnerability can be detected. This method is used to test four types of benchmark and fifty third-party applications,and the experimental results show the feasibility and effectiveness of the proposed approach.
出处 《计算机科学》 CSCD 北大核心 2016年第9期192-196,共5页 Computer Science
关键词 Android 静态污点分析 函数调用图 控制流图 Intent注入漏洞 Android, Static taint analysis, Call graph, Control flow graph, Intent injection vulnerability
  • 相关文献

参考文献13

  • 1Maji A K, Arshad F, Bagchi S, et al. An empirical study of the robustness of inter-component communication in Android[C]// 2012 42nd Annual IEEE/IFIP International Conference on De- pendable Systems and Networks (DSN). IEEE,2012:1-12.
  • 2Sasnauskas R, Regehr J. Intent fuzzer: crafting intents of death [C]//Proceedings of the 2014 Joint International Workshop on Dynamic Analysis (WODA) and Software and System Perfor- mance Testing, Debugging, and Analytics (PERTEA). ACM, 2014:1-5.
  • 3Chin E, Felt A P, Greenwood K, et al. Analyzing inter-applica- tion communication in Android[C]//Proceedings of the 9th In- ternational Conference on Mobile Systems, Applications, and Services. ACM, 2011 : 239-252.
  • 4Lu L, Li Z,Wu Z, et al. Chex: statically vetting android apps for component hijacking vulnerabilities[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Securi- ty. ACM,2012:229-240.
  • 5Octeau D, MeDaniel P, Jha S, et al. Effective inter-component communication mapping in android with epiee: An essential step towards holistie security analysis[C]//USENIX Security 2013. 2013:543-558.
  • 6Sagiv M, Reps T, Horwitz S. Precise interprocedural data flow analysis with applications to constant propagation[J]. Theoreti- cal Computer Science, 1996,167 (1) : 131-170.
  • 7Gallingani D, Gjomemo R, Venkatakrishnan V N, et al. Static detection and automatic exploitation of intent message vulnera- bilities in Android applications[OL], http://www, ieee-seeuri- ty. org/TC/spw2015/Most/papers/s3pl, pdf.
  • 8Enck W, Octeau D, McDaniel P, et al. A Study of Android Appli- cation Security[OL]. http://www, usenix, org/legacy/events/ secll/teeh/full_papers/Enck, pdf.
  • 9Takeshi Terada/Mitsui Bussan Secure Directions, Inc. Attacking Android browsers via intent scheme URLs[OL]. http://www. mhsd. jp/whitepaper/InterScheme, pdf.
  • 10Wang R, Xing L, Wang X F, et al. Unauthorized origin crossing on mobile platforms: Threats and mitigation[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer : Commu- nications Security. ACM, 2013 : 635-646.

同被引文献51

引证文献6

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部