欢迎访问中国科学院大学学报,今天是

中国科学院大学学报 ›› 2015, Vol. 32 ›› Issue (1): 127-135.DOI: 10.7523/j.issn.2095-6134.2015.01.021

• 计算机科学 • 上一篇    下一篇

Android应用软件功能泄露漏洞挖掘工具的设计与实现

方喆君, 刘奇旭, 张玉清   

  1. 中国科学院大学 国家计算机网络入侵防范中心, 北京 101408
  • 收稿日期:2014-01-27 修回日期:2014-03-25 发布日期:2015-01-15
  • 通讯作者: 方喆君
  • 基金资助:

    国家自然科学基金(61272481,61303239)、北京市自然科学基金 (4122089)、国家发改委信息安全专项(高技[2012]1424)和中国科学院大学校长基金资助

Design and implementation of capability leak detection for Android applications

FANG Zhejun, LIU Qixu, ZHANG Yuqing   

  1. National Computer Network Intrusion Protection Center, University of Chinese Academy of Science, Beijing 101408, China
  • Received:2014-01-27 Revised:2014-03-25 Published:2015-01-15

摘要:

Android平台的功能泄露漏洞会导致权限提升和隐私泄露等严重危害,常被恶意软件用于绕过安全机制.针对这一问题,提出一个基于静态分析的功能泄露漏洞挖掘工具CLDroid.CLDroid使用逆向控制流的程序切片算法从源代码中提取程序逻辑,并利用可定制的安全规则库来检测违规行为.实验结果表明,CLDroid能有效挖掘Android源代码中的功能泄露漏洞,且具有较好的可扩展性.

关键词: 功能泄露漏洞, 静态分析, 程序切片, Android安全

Abstract:

Capability leak vulnerability on Android platform may lead to permission elevation and privacy disclosure, and it is often exploited by malicious applications to bypass Android security mechanism. However, so far there is no approach aiming at Android capability leak detection on the source code level comprehensively. In this paper, we propose a novel approach named CLDroid, which uses backward program slicing to abstract application logic from the Java source code, detects pattern violations based on predefined security rules, and reports the violations as capability leak vulnerability. Results show that our approach is effective in detecting capability leak vulnerability and has better scalability.

Key words: capability leak vulnerability, static analysis, program slicing, Android security

中图分类号: