Reach Me if You Can: On Native Vulnerability Reachability in Android Apps

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Android applications ship with several native C/C++ libraries. Research on Android security has revealed that these libraries often come from third-party components that are not kept up to date by developers, possibly posing security concerns. To assess if known vulnerabilities in these libraries constitute an immediate security problem, we need to understand whether vulnerable functions could be reached when apps are executed (we refer to this problem as function reachability). In this paper, we propose DroidReach, a novel, static approach to assess the reachability of native function calls in Android apps. Our framework addresses the limitations of state-of-the-art approaches by employing a combination of heuristics and symbolic execution, allowing for a more accurate reconstruction of the Inter-procedural Control-Flow Graphs (ICFGs). On the top 500 applications from the Google Play Store, DroidReach can detect a significantly higher number of paths in comparison to previous works. Finally, two case studies show how DroidReach can be used as a valuable vulnerability assessment tool.

Cite

CITATION STYLE

APA

Borzacchiello, L., Coppa, E., Maiorca, D., Columbu, A., Demetrescu, C., & Giacinto, G. (2022). Reach Me if You Can: On Native Vulnerability Reachability in Android Apps. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 13556 LNCS, pp. 701–722). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-17143-7_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free