[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3103111.3104040acmotherconferencesArticle/Chapter ViewAbstractPublication PagesisstaConference Proceedingsconference-collections
short-paper

Software Model Checking: A Promising Approach to Verify Mobile App Security: A Position Paper

Published: 18 June 2017 Publication History

Abstract

In this position paper we advocate software model checking as a technique suitable for security analysis of mobile apps. Our recommendation is based on promising results that we achieved on analysing app collusion in the context of the Android operating system. Broadly speaking, app collusion is when, in performing a threat, several apps are working together, i.e., they exchange information which they could not obtain on their own. In this context, we developed the K-Android tool, which provides an encoding of the Android/Smali code semantics within the K framework. K-Android allows for software model checking of Android APK files. Though our experience so far is limited to collusion, we believe the approach to be applicable to further security properties as well as other mobile operating systems.

References

[1]
Android Open Source Project. 2016. Dalvik Bytecode. https://source.android.com/devices/tech/dalvik/dalvik-bytecode.html. (2016).
[2]
Gilad Arnold, Roman Manevich, Mooly Sagiv, and Ran Shaham. 2006. Combining Shape Analyses by Intersecting Abstractions. In VMCAI2006 (Lecture Notes in Computer Science), Vol. 3855. Springer, 33--48.
[3]
Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, Edinburgh, United Kingdom - June 09-11, 2014. ACM, 29.
[4]
Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach, and Siraj Ahmed Shaikh. 2016. Utilising K Semantics for Collusion Detection in Android Applications. In FMICS-AVoCS 2016 (Lecture Notes in Computer Science), Vol. 9933. Springer, 142--149.
[5]
Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, and Mauro Conti. 2016. Android App Collusion.reat and Mitigation Techniques. CoRR abs/1611.10076 (2016). h.p://arxiv.org/abs/1611.10076
[6]
Denis Bogdanas and Grigore Rosu. 2015. K-Java: A Complete Semantics of Java. In POPL 2015. ACM, 445--456.
[7]
Kandroid ACID Team. 2017. Kandroid Tool. http://www.cs.swan.ac.uk/~csmarkus/ProcessesAndData/androidsmali-semantics-k. (2017).
[8]
Johannes Kinder, Florian Zuleger, and Helmut Veith. 2009. An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries. In VMCAI2009 (Lecture Notes in Computer Science), Vol. 5403. Springer, 214--228.
[9]
Xavier Leroy. 2009. Formal verification of a realistic compiler. Commun. ACM 52, 7 (2009), 107--115.
[10]
Florian Martin, Martin Alt, Reinhard Wilhelm, and Christian Ferdinand. 1998. Analysis of Loops. In Compiler Construction, 7th International Conference in ETAPS'98 (Lecture Notes in Computer Science), Vol. 1383. Springer, 80--94.
[11]
Damien Octeau, Daniel Luchaup, Somesh Jha, and Patrick D. McDaniel. 2016. Composite Constant Propagation and its Application to Android Program Analysis. IEEE Trans. Software Eng. 42, 11 (2016), 999--1014.
[12]
Grigore Roşu and Traian Florin Şerbănuţă. 2010. An Overview of the K Semantic Framework. Journal of Logic and Algebraic Programming 79, 6 (2010), 397--434.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
FTFJP'17: Proceedings of the 19th Workshop on Formal Techniques for Java-like Programs
June 2017
49 pages
ISBN:9781450350983
DOI:10.1145/3103111
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 June 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Android
  2. Collusion
  3. Mobile Security
  4. Software Model Checking

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

ECOOP '17

Acceptance Rates

FTFJP'17 Paper Acceptance Rate 10 of 12 submissions, 83%;
Overall Acceptance Rate 51 of 75 submissions, 68%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 114
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media