Intelligent Detection of Cryptographic Misuse in Android Applications Based on Program Slicing andTransformer-Based Classifier
-
Published:2023-05-30
Issue:11
Volume:12
Page:2460
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Wang Lizhen12, Wang Jizhi1234, Sui Tongtong12, Kong Lingrui12, Zhao Yue12
Affiliation:
1. School of Computer Science and Technology, Qilu University of Technology (Shandong Academy of Science), Jinan 250353, China 2. Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science Center (National Supercomputing Center in Jinan), Jinan 250014, China 3. Quancheng Laboratory, Jinan 250100, China 4. Jinan Institute of Supercomputing Technology, Jinan 250301, China
Abstract
The utilization of cryptography in applications has assumed paramount importance with the escalating security standards for Android applications. The adept utilization of cryptographic APIs can significantly enhance application security; however, in practice, software developers frequently misuse these APIs due to their inadequate grasp of cryptography. A study reveals that a staggering 88% of Android applications exhibit some form of cryptographic misuse. Although certain tools have been proposed to detect such misuse, most of them rely on manually devised rules which are susceptible to errors and require researchers possessing an exhaustive comprehension of cryptography. In this study, we propose a research methodology founded on a neural network model to pinpoint code related to cryptography by employing program slices as a dataset. We subsequently employ active learning, rooted in clustering, to select the portion of the data harboring security issues for annotation in accordance with the Android cryptography usage guidelines. Ultimately, we feed the dataset into a transformer and multilayer perceptron (MLP) to derive the classification outcome. Comparative experiments are also conducted to assess the model’s efficacy in comparison to other existing approaches. Furthermore, planned combination tests utilizing supplementary techniques aim to validate the model’s generalizability.
Funder
Key R&D Plan of Shandong Province Major Innovation Project of Science, Education and Industry of Shandong Academy of Sciences
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference30 articles.
1. Allix, K., Bissyandé, T.F., Klein, J., and Le Traon, Y. (2016, January 14–15). Androzoo: Collecting millions of android apps for the research community. Proceedings of the 13th International Conference on Mining Software Repositories, Austin, TX, USA. 2. Egele, M., Brumley, D., Fratantonio, Y., and Kruegel, C. (2013, January 4–8). An empirical study of cryptographic misuse in android applications. Proceedings of the ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany. 3. Shuai, S., Guowei, D., Tao, G., Tianchang, Y., and Chenjie, S. (2014, January 24–27). Modelling analysis and auto-detection of cryptographic misuse in android applications. Proceedings of the IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, Dalian, China. 4. Crysl: An extensible approach to validating the correct usage of cryptographic apis;Ali;IEEE Trans. Softw. Eng.,2019 5. Rahaman, S., Xiao, Y., Afrose, S., Shaon, F., Tian, K., Frantz, M., Kantarcioglu, M., and Yao, D.D. (2019, January 11–15). CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, London, UK.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|