组件拒绝服务漏洞自动挖掘技术  

Mining denial of service vulnerability in Android applications automatically

在线阅读下载全文

作  者:周敏[1] 周安民[1] 刘亮[1] 贾鹏[1] 谭翠江 

机构地区:[1]四川大学电子信息学院,成都610065

出  处:《计算机应用》2017年第11期3288-3293,3329,共7页journal of Computer Applications

摘  要:针对Android应用对获取到的数据没有进行空数据和异常数据的安全验证,会发生崩溃导致组件拒绝服务的问题,提出了一种组件拒绝服务漏洞自动化挖掘框架。通过逆向分析和静态数据流分析技术获取安卓应用的包名和组件信息,同时跟踪应用对Intent对象的数据访问,提取Intent对象携带的数据信息,并且识别公开组件启动私有组件的路径信息,辅助动态模糊测试挖掘漏洞。为了增大测试用例的覆盖范围和实现自动化,该框架增加了对Intent的Action、Category、Data和Extra属性的畸变,并且采用Accessibility技术自动关闭应用崩溃弹窗,大幅提高了检测效率。为了验证框架的有效性和实用性,利用所提的框架设计实现了工具——DroidRVMS,并与Intent Fuzzer工具进行了对比。实验结果表明,DroidRVMS能够有效地发现动态广播组件的拒绝服务漏洞和大部分类型异常导致的拒绝服务攻击。Concerning the fact that when the receiver of an Intent does not validate empty data and abnormal data, the process will crash and cause denial of service, an automated Android component vulnerability mining framework based on static analysis techniques and fuzzing test techniques was proposed, In this framework, reverse analysis techniques and static data flow analysis techniques were used to extract package name, component, Intent with the data of a traffic and data flow paths from exported component to private component to assist fuzzing test. In addition, more mutation strategy on the attributes of Intent (such as Action, Category, Data and Extra) were added while generating Intent tests and the Accessibility technology was adopted to close the crash windows in order to realize automation. Finally, a tool named DroidRVMS was implemented, and a comparative experiment with Intent Fuzzer was designed to verify the validity of the framework. The experimental results show that DroidRVMS can find denial of service vulnerability resulting from dynamic broadcast receiver and most types of exceptions.

关 键 词:组件通信 拒绝服务 静态分析 动态分析 漏洞挖掘 

分 类 号:TP311[自动化与计算机技术—计算机软件与理论]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象