作者
Zhengyang Qu, Shahid Alam, Yan Chen, Xiaoyong Zhou, Wangjun Hong, Ryan Riley
发表日期
2017/6/26
研讨会论文
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
页码范围
415-426
出版商
IEEE
简介
Android has provided dynamic code loading (DCL) since API level one. DCL allows an app developer to load additional code at runtime. DCL raises numerous challenges with regards to security and accountability analysis of apps. While previous studies have investigated DCL on Android, in this paper we formulate and answer three critical questions that are missing from previous studies: (1) Where does the loaded code come from (remotely fetched or locally packaged), and who is the responsible entity to invoke its functionality? (2) In what ways is DCL utilized to harden mobile apps, specifically, application obfuscation? (3) What are the security risks and implications that can be found from DCL in off-the-shelf apps? We design and implement DyDroid, a system which uses both dynamic and static analysis to analyze dynamically loaded code. Dynamic analysis is used to automatically exercise apps, capture …
引用总数
20182019202020212022202320245666482
学术搜索中的文章
Z Qu, S Alam, Y Chen, X Zhou, W Hong, R Riley - 2017 47th Annual IEEE/IFIP International Conference …, 2017