A Static Assurance Analysis of Android Applications
dc.contributor.author | Elish, Karim O. | en |
dc.contributor.author | Yao, Danfeng (Daphne) | en |
dc.contributor.author | Ryder, Barbara G. | en |
dc.contributor.author | Jiang, Xuxian | en |
dc.contributor.department | Computer Science | en |
dc.date.accessioned | 2013-07-11T16:27:13Z | en |
dc.date.available | 2013-07-11T16:27:13Z | en |
dc.date.issued | 2013-07-11 | en |
dc.description.abstract | We describe an efficient approach to identify malicious Android applications through specialized static program analysis. Our solution – referred to as user intention program dependence analysis – performs offline analysis to find the dependence relations between user triggers and entry points to methods providing critical system functions. Analyzing these types of dependences in programs can identify the privileged operations (e.g., file, network operations and sensitive data access) that are not intended by users. We apply our technique on 708 free popular apps and 482 malware apps for Android OS, and the experimental results show that our technique can differentiate between legitimate and malware applications with high accuracy. We also explain the limitations of the user-intention-based approach and point out the need for practitioners to adopt multiple analysis tools for evaluating the assurance of Android applications. | en |
dc.identifier.trnumber | TR-13-03 | en |
dc.identifier.uri | http://hdl.handle.net/10919/23302 | en |
dc.language.iso | en | en |
dc.publisher | Department of Computer Science, Virginia Polytechnic Institute & State University | en |
dc.relation.ispartof | Computer Science Technical Reports | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.subject | Computer science | en |
dc.subject | Software engineering | en |
dc.title | A Static Assurance Analysis of Android Applications | en |
dc.type | Technical report | en |
dc.type.dcmitype | Text | en |