Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

IccTA: Detecting inter-component privacy leaks in Android apps

 
: Li, Li; Bartel, Alexandre; Bissyande, Tegawende F.; Klein, Jacques; Le Traon, Yves; Arzt, Steven; Rasthofer, Siegfried; Bodden, Eric; Octeau, Damien; McDaniel, Patrick

:

Institute of Electrical and Electronics Engineers -IEEE-; Association for Computing Machinery -ACM-; IEEE Computer Society, Technical Council on Software Engineering:
IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015. Proceedings. Vol.1, Pt.1 : Florence, Italy, 16 - 24 May 2015
Piscataway, NJ: IEEE, 2015
ISBN: 978-1-4799-1935-2
ISBN: 978-1-4799-1934-5
pp.280-291
International Conference on Software Engineering (ICSE) <37, 2015, Florence>
English
Conference Paper
Fraunhofer SIT ()

Abstract
Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. At installation, this application is given permission to (1) access the Internet (for updating wallpapers) and (2) use the device microphone (to change background following noise changes). With these permissions, the application could silently record user conversations and upload them remotely. To give more confidence about how Shake Them All actually processes what it records, it is necessary to build a precise analysis tool that tracks the flow of any sensitive data from its source point to any sink, especially if those are in different components. Since Android applications may leak private data carelessly or maliciously, we propose IccTA, a static taint analyzer to detect privacy leaks among components in Android applications. IccTA goes beyond state-of-the-art approaches by supporting inter- component detection. By propagating context information among components, IccTA improves the precision of the analysis. IccTA outperforms existing tools on two benchmarks for ICC-leak detectors: DroidBench and ICC-Bench. Moreover, our approach detects 534 ICC leaks in 108 apps from MalGenome and 2,395 ICC leaks in 337 apps in a set of 15,000 Google Play apps.

: http://publica.fraunhofer.de/documents/N-382702.html