Affiliation:
1. EC SPRIDE, Technische Universität, Darmstadt
2. University of Luxembourg
3. Pennsylvania State University
Abstract
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by carelessly programmed apps that leak important data by accident, and by malicious apps that exploit their given privileges to copy such data intentionally. While existing static taint-analysis approaches have the potential of detecting such data leaks ahead of time, all approaches for Android use a number of coarse-grain approximations that can yield high numbers of missed leaks and false alarms.
In this work we thus present FlowDroid, a novel and highly precise static taint analysis for Android applications. A precise model of Android's lifecycle allows the analysis to properly handle callbacks invoked by the Android framework, while context, flow, field and object-sensitivity allows the analysis to reduce the number of false alarms. Novel on-demand algorithms help FlowDroid maintain high efficiency and precision at the same time.
We also propose DroidBench, an open test suite for evaluating the effectiveness and accuracy of taint-analysis tools specifically for Android apps. As we show through a set of experiments using SecuriBench Micro, DroidBench, and a set of well-known Android test applications, FlowDroid finds a very high fraction of data leaks while keeping the rate of false positives low. On DroidBench, FlowDroid achieves 93% recall and 86% precision, greatly outperforming the commercial tools IBM AppScan Source and Fortify SCA. FlowDroid successfully finds leaks in a subset of 500 apps from Google Play and about 1,000 malware apps from the VirusShare project.
Funder
Bundesministerium für Bildung und Forschung
Deutsche Forschungsgemeinschaft
Google
Hessian LOEWE excellence initiative within CASED
Division of Computer and Network Systems
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Graphics and Computer-Aided Design,Software
Reference41 articles.
1. Virus share aug 2013. http://virusshare.com/. Virus share aug 2013. http://virusshare.com/.
2. IBM Rational AppScan Apr. 2013. http://www-01.ibm.com/software/de/rational/appscan/. IBM Rational AppScan Apr. 2013. http://www-01.ibm.com/software/de/rational/appscan/.
3. Fortify 360 Source Code Analyzer (SCA) Apr. 2013. http://www8.hp.com/us/en/software-solutions/software.html?compURI=1214365#.UW6CVKuAtfQ. Fortify 360 Source Code Analyzer (SCA) Apr. 2013. http://www8.hp.com/us/en/software-solutions/software.html?compURI=1214365#.UW6CVKuAtfQ.
4. Automatically securing permission-based software by reducing the attack surface: an application to Android
5. Dexpler
Cited by
560 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automated Repair of Information Flow Security in Android Implicit Inter-App Communication;Lecture Notes in Computer Science;2024-09-11
2. Better Not Together: Staged Solving for Context-Free Language Reachability;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
3. NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
4. Call Graph Soundness in Android Static Analysis;Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis;2024-09-11
5. SPATA: Effective OS Bug Detection with Summary-Based, Alias-Aware and Path-Sensitive Typestate Analysis;ACM Transactions on Computer Systems;2024-09-06