File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/MM.2015.25
- Scopus: eid_2-s2.0-84925070537
- WOS: WOS:000351462300007
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: VulHunter: Toward discovering vulnerabilities in android applications
Title | VulHunter: Toward discovering vulnerabilities in android applications |
---|---|
Authors | |
Keywords | Android applications app property graph static analysis vulnerabilities detection |
Issue Date | 2015 |
Citation | IEEE Micro, 2015, v. 35, n. 1, p. 44-53 How to Cite? |
Abstract | With the prosperity of the Android app economy, many apps have been published and sold in various markets. However, short development cycles and insufficient security development guidelines have led to many vulnerable apps. Although some systems have been developed for automatically discovering specific vulnerabilities in apps, their effectiveness and efficiency are usually restricted because of the exponential growth of paths to examine and simplified assumptions. In this article, the authors propose a new static-analysis framework for facilitating security analysts to detect vulnerable apps from three aspects. First, they propose an app property graph (APG), a new data structure containing detailed and precise information from apps. Second, by modeling app-related vulnerabilities as graph traversals, the authors conduct graph traversals over APGs to identify vulnerable apps for easing the identification process. Third, they reduce the workload of manual verification by removing infeasible paths and generating attack inputs whenever possible. They have implemented the framework in a system named VulHunter with 9,145 lines of Java code and modeled five types of vulnerabilities. Checking 557 popular apps that are randomly collected from Google Play and have at least 1 million installations, the authors found that 375 apps (67.3 percent) have at least one vulnerability. |
Persistent Identifier | http://hdl.handle.net/10722/303444 |
ISSN | 2023 Impact Factor: 2.8 2023 SCImago Journal Rankings: 1.145 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Qian, Chenxiong | - |
dc.contributor.author | Luo, Xiapu | - |
dc.contributor.author | Le, Yu | - |
dc.contributor.author | Gu, Guofei | - |
dc.date.accessioned | 2021-09-15T08:25:19Z | - |
dc.date.available | 2021-09-15T08:25:19Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | IEEE Micro, 2015, v. 35, n. 1, p. 44-53 | - |
dc.identifier.issn | 0272-1732 | - |
dc.identifier.uri | http://hdl.handle.net/10722/303444 | - |
dc.description.abstract | With the prosperity of the Android app economy, many apps have been published and sold in various markets. However, short development cycles and insufficient security development guidelines have led to many vulnerable apps. Although some systems have been developed for automatically discovering specific vulnerabilities in apps, their effectiveness and efficiency are usually restricted because of the exponential growth of paths to examine and simplified assumptions. In this article, the authors propose a new static-analysis framework for facilitating security analysts to detect vulnerable apps from three aspects. First, they propose an app property graph (APG), a new data structure containing detailed and precise information from apps. Second, by modeling app-related vulnerabilities as graph traversals, the authors conduct graph traversals over APGs to identify vulnerable apps for easing the identification process. Third, they reduce the workload of manual verification by removing infeasible paths and generating attack inputs whenever possible. They have implemented the framework in a system named VulHunter with 9,145 lines of Java code and modeled five types of vulnerabilities. Checking 557 popular apps that are randomly collected from Google Play and have at least 1 million installations, the authors found that 375 apps (67.3 percent) have at least one vulnerability. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Micro | - |
dc.subject | Android applications | - |
dc.subject | app property graph | - |
dc.subject | static analysis | - |
dc.subject | vulnerabilities detection | - |
dc.title | VulHunter: Toward discovering vulnerabilities in android applications | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/MM.2015.25 | - |
dc.identifier.scopus | eid_2-s2.0-84925070537 | - |
dc.identifier.volume | 35 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | 44 | - |
dc.identifier.epage | 53 | - |
dc.identifier.isi | WOS:000351462300007 | - |