首页 | 本学科首页   官方微博 | 高级检索  
     


VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique
Authors:Atefeh Nirumand  Bahman Zamani  Behrouz Tork Ladani
Affiliation:1. MDSE Research Group, Department of Software Engineering, University of Isfahan, Isfahan, Iran;2. Department of Software Engineering, University of Isfahan, Isfahan, Iran
Abstract:Android is extensively used worldwide by mobile application developers. Android provides applications with a message passing system to communicate within and between them. Due to the risks associated with this system, it is vital to detect its unsafe operations and potential vulnerabilities. To achieve this goal, a new framework, called VAnDroid, based on Model Driven Reverse Engineering (MDRE), is presented that identifies security risks and vulnerabilities related to the Android application communication model. In the proposed framework, some security-related information included in an Android app is automatically extracted and represented as a domain-specific model. Then, it is used for analyzing security configurations and identifying vulnerabilities in the corresponding application. The proposed framework is implemented as an Eclipse-based tool, which automatically identifies the Intent Spoofing and Unauthorized Intent Receipt as two attacks related to the Android application communication model. To evaluate the tool, it has been applied to several real-world Android applications, including 20 apps from Google Play and 110 apps from the F-Droid repository. VAnDroid is also compared with several existing analysis tools, and it is shown that it has a number of key advantages over those tools specifically regarding its high correctness, scalability, and usability in discovering vulnerabilities. The results well indicate the effectiveness and capacity of the VAnDroid as a promising approach in the field of Android security.
Keywords:Android application  Android application communication model  Android security  domain-specific model  model-driven reverse engineering  vulnerabilities
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号