[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ICSE-Companion.2019.00092acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

FastDroid: efficient taint analysis for Android applications

Published: 25 May 2019 Publication History

Abstract

In recent years, sensitive data leaks of Android system attracted significant attention. The traditional tools for detecting leaks usually focus on the precision and recall with few of them addressing the importance of the efficiency. The high costs of these tools often make them fail in analyzing apps in large scale and thus block them from wide usage in practice. In this paper, we propose FastDroid, an efficient and precise tool for detecting sensitive data leaks in Android apps. First, a flow-insensitive taint analysis is conducted to construct the taint value graph (TVG) which is defined to describe the process of taint propagation. Then, potential taint flows (PTFs) are extracted from TVG. Finally, the PTFs are checked on the control flow graph (CFG) to acquire the real taint flows. FastDroid is evaluated on three test suites. The results show that FastDroid maintains a high precision and recall; meanwhile it improves the efficiency significantly.

References

[1]
S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. L. Traon, D. Octeau, and P. D. Mcdaniel, "Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps," Programming Language Design and Implementation, vol. 49, no. 6, pp. 259--269, 2014.
[2]
Y. Zhou and X. Jiang, "Dissecting android malware: Characterization and evolution," IEEE Symposium on Security and Privacy, pp. 95--109, 2012.

Cited By

View all
  • (2024)Giving without Notifying: Assessing Compliance of Data Transmission in Android AppsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695528(1595-1606)Online publication date: 27-Oct-2024
  • (2023)TaintMini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint AnalysisProceedings of the 45th International Conference on Software Engineering10.1109/ICSE48619.2023.00086(932-944)Online publication date: 14-May-2023
  • (2021)A Survey on Windows-based Ransomware Taxonomy and Detection MechanismsACM Computing Surveys10.1145/345315354:6(1-36)Online publication date: 13-Jul-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE '19: Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings
May 2019
369 pages

Sponsors

Publisher

IEEE Press

Publication History

Published: 25 May 2019

Check for updates

Author Tags

  1. Android
  2. security
  3. static analysis
  4. taint analysis

Qualifiers

  • Research-article

Conference

ICSE '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 276 of 1,856 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Giving without Notifying: Assessing Compliance of Data Transmission in Android AppsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695528(1595-1606)Online publication date: 27-Oct-2024
  • (2023)TaintMini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint AnalysisProceedings of the 45th International Conference on Software Engineering10.1109/ICSE48619.2023.00086(932-944)Online publication date: 14-May-2023
  • (2021)A Survey on Windows-based Ransomware Taxonomy and Detection MechanismsACM Computing Surveys10.1145/345315354:6(1-36)Online publication date: 13-Jul-2021
  • (2021)An efficient approach for taint analysis of android applicationsComputers and Security10.1016/j.cose.2020.102161104:COnline publication date: 1-May-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media