论文标题
RAICC:在Android应用中揭示了非典型的组成间通信
RAICC: Revealing Atypical Inter-Component Communication in Android Apps
论文作者
论文摘要
组分间通信(ICC)是Android的关键机制。它使开发人员能够构成丰富的功能并探索在应用程序内部和跨应用程序内部的重用。不幸的是,正如大量文献报道的那样,ICC“相当复杂且在很大程度上不受限制”,使空间缺乏应用程序建模的精确度。为了应对在应用程序中跟踪ICC的挑战,诸如EPICC,ICCTA和Amandroid之类的最新静态方法已重点介绍已记录的框架ICC方法(例如起始攻击性)来构建其方法。在这项工作中,我们表明在这些最先进的工具中推断出的ICC模型实际上可能不完整:该框架提供了其他非典型的执行ICC的方式。 To address this limitation in the state of the art, we propose RAICC a static approach for modeling new ICC links and thus boosting previous analysis tasks such as ICC vulnerability detection, privacy leaks detection, malware detection, etc. We have evaluated RAICC on 20 benchmark apps, demonstrating that it improves the precision and recall of uncovered leaks in state of the art tools.我们还进行了大量的实证研究,表明非典型ICC方法主要用于Android应用中,尽管不一定用于数据传输。我们还表明,RAICC在现实世界恶意应用程序数据集中将ICC链接的数量增加了61.6%,并且RAICC可以检测新的ICC漏洞。
Inter-Component Communication (ICC) is a key mechanism in Android. It enables developers to compose rich functionalities and explore reuse within and across apps. Unfortunately, as reported by a large body of literature, ICC is rather "complex and largely unconstrained", leaving room to a lack of precision in apps modeling. To address the challenge of tracking ICCs within apps, state of the art static approaches such as Epicc, IccTA and Amandroid have focused on the documented framework ICC methods (e.g., startActivity) to build their approaches. In this work we show that ICC models inferred in these state of the art tools may actually be incomplete: the framework provides other atypical ways of performing ICCs. To address this limitation in the state of the art, we propose RAICC a static approach for modeling new ICC links and thus boosting previous analysis tasks such as ICC vulnerability detection, privacy leaks detection, malware detection, etc. We have evaluated RAICC on 20 benchmark apps, demonstrating that it improves the precision and recall of uncovered leaks in state of the art tools. We have also performed a large empirical investigation showing that Atypical ICC methods are largely used in Android apps, although not necessarily for data transfer. We also show that RAICC increases the number of ICC links found by 61.6% on a dataset of real-world malicious apps, and that RAICC enables the detection of new ICC vulnerabilities.