作者
Michael Backes, Robert Künnemann, Esfandiar Mohammadi
发表日期
2016/10/24
研讨会论文
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
页码范围
717-730
出版商
ACM
简介
Automatically analyzing information flow within Android applications that rely on cryptographic operations with their computational security guarantees imposes formidable challenges that existing approaches for understanding an app's behavior struggle to meet. These approaches do not distinguish cryptographic and non-cryptographic operations, and hence do not account for cryptographic protections: f(m) is considered sensitive for a sensitive message m irrespective of potential secrecy properties offered by a cryptographic operation f. These approaches consequently provide a safe approximation of the app's behavior, but they mistakenly classify a large fraction of apps as potentially insecure and consequently yield overly pessimistic results. In this paper, we show how cryptographic operations can be faithfully included into existing approaches for automated app analysis. To this end, we first show how …
引用总数
20162017201820192020111
学术搜索中的文章
M Backes, R Künnemann, E Mohammadi - Proceedings of the 2016 ACM SIGSAC Conference on …, 2016