Compositional Taint Analysis of Native Codes for Security Vetting of Android Applications

Author(s):  
Seyed Behnam Andarzian ◽  
Behrouz Tork Ladani
2021 ◽  
Vol 27 (1) ◽  
Author(s):  
Linghui Luo ◽  
Felix Pauck ◽  
Goran Piskachev ◽  
Manuel Benz ◽  
Ivan Pashchenko ◽  
...  

AbstractDue to the lack of established real-world benchmark suites for static taint analyses of Android applications, evaluations of these analyses are often restricted and hard to compare. Even in evaluations that do use real-world apps, details about the ground truth in those apps are rarely documented, which makes it difficult to compare and reproduce the results. To push Android taint analysis research forward, this paper thus recommends criteria for constructing real-world benchmark suites for this specific domain, and presents TaintBench, the first real-world malware benchmark suite with documented taint flows. TaintBench benchmark apps include taint flows with complex structures, and addresses static challenges that are commonly agreed on by the community. Together with the TaintBench suite, we introduce the TaintBench framework, whose goal is to simplify real-world benchmarking of Android taint analyses. First, a usability test shows that the framework improves experts’ performance and perceived usability when documenting and inspecting taint flows. Second, experiments using TaintBench reveal new insights for the taint analysis tools Amandroid and FlowDroid: (i) They are less effective on real-world malware apps than on synthetic benchmark apps. (ii) Predefined lists of sources and sinks heavily impact the tools’ accuracy. (iii) Surprisingly, up-to-date versions of both tools are less accurate than their predecessors.


2019 ◽  
Vol 51 ◽  
pp. 1-14 ◽  
Author(s):  
Wontae Choi ◽  
Jayanthkumar Kannan ◽  
Domagoj Babic

Sign in / Sign up

Export Citation Format

Share Document