AppChainer:investigating the chainability among payloads in android applications  

在线阅读下载全文

作  者:Xiaobo Xiang Yue Jiang Qingli Guo Xiu Zhang Xiaorui Gong Baoxu Liu 

机构地区:[1]School of Cyber Security,University of Chinese Academy of Sciences,Beijing,China [2]Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China

出  处:《Cybersecurity》2023年第4期182-200,共19页网络空间安全科学与技术(英文)

基  金:This work was supported by the Strategic Priority Research Program of Chinese Academy of Sciences(No.XDC02040100).

摘  要:Statistics show that more than 80 applications are installed on each android smartphone.Vulnerability research on Android applications is of critical importance.Recently,academic researchers mainly focus on single bug patterns,while few of them investigate the relations between multiple bugs.Industrial researchers proposed a series of logic exploit chains leveraging multiple logic bugs.However,there is no general model to evaluate the chaining abilities between bugs.This paper presents a formal model to elucidate the relations between multiple bugs in Android applications.To prove the effectiveness of the model,we design and implement a prototype system named AppChainer.AppChainer automatically identifies attack surfaces of Android applications and investigates whether the payloads entering these attack surfaces are“chainable”.Experimental results on 2138 popular Android applications show that AppChainer is effective in identifying and chaining attacker-controllable payloads.It identifies 14467 chainable payloads and constructs 5458 chains both inside a single application and among various applications.The time cost and resource consumption of AppChainer are also acceptable.For each application,the average analysis time is 317 s,and the average memory consumed is 2368 MB.Compared with the most relevant work Jandroid,the experiment results on our custom DroidChainBench show that AppChainer outperforms Jandroid at the precision rate and performs equally with Jandroid at the recall rate.

关 键 词:Android security Vulnerability exploit Payload chain 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象