Write a Blog >>
ICSE 2021
Mon 17 May - Sat 5 June 2021

The Android platform facilitates reuse of app functionalities by allowing an app to request an action from another app through inter-process communication mechanism. This feature is one of the reasons for the popularity of Android, but it also poses security risks to end users because malicious, unprivileged apps could exploit this feature to make privileged apps perform privileged actions on behalf of them.

In our journal paper, we investigate the hybrid use of program analysis, genetic algorithm based test generation, natural language processing, machine learning techniques for precise detection of permission re-delegation vulnerabilities in Android apps. Our approach first groups a large set of benign and ”safe” apps into different clusters, based on their similarities in terms of functional descriptions. It then generates permission re-delegation model for each cluster, which characterizes common permission re-delegation behaviors of the apps in the cluster. Given an app under test, our approach checks whether it has permission re-delegation behaviors that deviate from the model of the cluster it belongs to. If that is the case, it generates test cases to detect the vulnerabilities. We evaluated the vulnerability detection capability of our approach based on 1,258 official apps and 20 mutated apps. Our approach achieved 81.8% recall and 100% precision. We also compared our approach with two static analysis-based approaches — Covert and IccTA — based on 595 open source apps. Our approach detected 30 vulnerable apps whereas Covert detected one of them and IccTA did not detect any. Executable proof-of-concept attacks generated by our approach were reported to the corresponding app developers.

Thu 27 May

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

10:00 - 11:00
3.1.4. Vulnerabilities in Android #2Journal-First Papers / Technical Track at Blended Sessions Room 4 +12h
Chair(s): Ignacio Panach Universidad de Valencia
10:00
20m
Paper
JUSTGen: Effective Test Generation for Unspecified JNI Behaviors on JVMsArtifact ReusableTechnical TrackArtifact Available
Technical Track
Sungjae Hwang KAIST, Sungho Lee KAIST, Jihoon Kim KAIST, Sukyoung Ryu KAIST
Pre-print Media Attached
10:20
20m
Paper
Why an Android App is Classified as Malware? Towards Malware Classification InterpretationJournal-First
Journal-First Papers
bozhi wu Nanyang Technological University, Sen Chen Tianjin University, Cuiyun Gao Harbin Institute of Technology, Lingling Fan Nankai University, Yang Liu Nanyang Technological University, Weiping Wen Peking University, Michael Lyu The Chinese University of Hong Kong
DOI Pre-print Media Attached
10:40
20m
Paper
Security Analysis of Permission Re-delegation Vulnerabilities in Android AppsJournal-First
Journal-First Papers
Biniam Fisseha Demissie Fondazione Bruno Kessler, Mariano Ceccato University of Verona, Lwin Khin Shar Singapore Management University
Link to publication DOI Media Attached
22:00 - 23:00
3.1.4. Vulnerabilities in Android #2Journal-First Papers / Technical Track at Blended Sessions Room 4
22:00
20m
Paper
JUSTGen: Effective Test Generation for Unspecified JNI Behaviors on JVMsArtifact ReusableTechnical TrackArtifact Available
Technical Track
Sungjae Hwang KAIST, Sungho Lee KAIST, Jihoon Kim KAIST, Sukyoung Ryu KAIST
Pre-print Media Attached
22:20
20m
Paper
Why an Android App is Classified as Malware? Towards Malware Classification InterpretationJournal-First
Journal-First Papers
bozhi wu Nanyang Technological University, Sen Chen Tianjin University, Cuiyun Gao Harbin Institute of Technology, Lingling Fan Nankai University, Yang Liu Nanyang Technological University, Weiping Wen Peking University, Michael Lyu The Chinese University of Hong Kong
DOI Pre-print Media Attached
22:40
20m
Paper
Security Analysis of Permission Re-delegation Vulnerabilities in Android AppsJournal-First
Journal-First Papers
Biniam Fisseha Demissie Fondazione Bruno Kessler, Mariano Ceccato University of Verona, Lwin Khin Shar Singapore Management University
Link to publication DOI Media Attached