CoChecker: Detecting capability and sensitive data leaks from component chains in android

18Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Studies show that malicious applications can obtain sensitive data from and perform protected operations in a mobile phone using an authorised yet vulnerable application as a deputy (referred to as privilege escalation attack). Thus it is desirable to have a checker that can help developers check whether their applications are vulnerable to these attacks. In this paper, we introduce our tool, CoChecker, to identify the leak paths (chains of components) that would lead to privilege escalation attacks using static taint analysis. We propose to build a call graph to model the execution of multiple entry points in a component and eliminate the false negatives due to the Android's event-driven programming paradigm. We further carry out inter-component communication through intent-tracing and formulate the call graph of the analyzed app. The evaluation of CoChecker on the state-of-the-art test suit DroidBench and randomly downloaded apps shows that it is both efficient and effective. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Cui, X., Yu, D., Chan, P., Hui, L. C. K., Yiu, S. M., & Qing, S. (2014). CoChecker: Detecting capability and sensitive data leaks from component chains in android. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8544 LNCS, pp. 446–453). Springer Verlag. https://doi.org/10.1007/978-3-319-08344-5_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free