首页 | 本学科首页   官方微博 | 高级检索  
     

基于静态污点分析的Android应用Intent注入漏洞检测方法
引用本文:王允超,魏强,武泽慧. 基于静态污点分析的Android应用Intent注入漏洞检测方法[J]. 计算机科学, 2016, 43(9): 192-196
作者姓名:王允超  魏强  武泽慧
作者单位:解放军信息工程大学 郑州450001数学工程与先进计算国家重点实验室 郑州450001,解放军信息工程大学 郑州450001数学工程与先进计算国家重点实验室 郑州450001,解放军信息工程大学 郑州450001数学工程与先进计算国家重点实验室 郑州450001
摘    要:针对Android应用程序组件间通信过程中的消息载体Intent有可能被攻击者构造进而引发组件被恶意注入的安全风险问题,提出了一种基于静态污点分析的检测方法。在构建Android应用的函数调用图和控制流图的基础上,通过跟踪应用组件内和组件间不可信Intent消息的污点传播过程,检测应用中潜在的Intent注入漏洞。用该方法对4类标准测试应用和50款第三方应用进行测试,实验结果表明了该方法的可行性和有效性。

关 键 词:Android  静态污点分析  函数调用图  控制流图  Intent注入漏洞
收稿时间:2015-08-12
修稿时间:2015-10-30

Approach of Android Applications Intent Injection Vulnerability Detection Based on Static Taint Analysis
WANG Yun-chao,WEI Qiang and WU Ze-hui. Approach of Android Applications Intent Injection Vulnerability Detection Based on Static Taint Analysis[J]. Computer Science, 2016, 43(9): 192-196
Authors:WANG Yun-chao  WEI Qiang  WU Ze-hui
Affiliation:PLA Information Engineering University,Zhengzhou 450001,China State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China,PLA Information Engineering University,Zhengzhou 450001,China State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China and PLA Information Engineering University,Zhengzhou 450001,China State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China
Abstract:As a message carrier in the process of component communication of Android application,Intent can be malformed by an attacker,leading to security risk of malicious component injection.A detection approach based on static taint analysis was presented.On the basis of building call graph and control flow graph of Android application,by trackingthe taint propagation with in and between components,the potential Intent injection vulnerability can be detected.This method is used to test four types of benchmark and fifty third-party applications,and the experimental results show the feasibility and effectiveness of the proposed approach.
Keywords:Android  Static taint analysis  Call graph  Control flow graph  Intent injection vulnerability
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号