Advertisement

Utilising \({\mathbb {K}}\) Semantics for Collusion Detection in Android Applications

  • Irina Măriuca Asăvoae
  • Hoang Nga Nguyen
  • Markus Roggenbach
  • Siraj Shaikh
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9933)

Abstract

The Android OS supports multiple communication methods between apps. This opens the possibility to carry out threats in a collaborative fashion, c.f. the Soundcomber example from 2011. In this paper we demonstrate an effective attempt to detect collusion via model-checking a set of apps utilising the \({\mathbb {K}}\) framework.

Notes

Acknowledgement

The authors would like to thank our colleagues in ACID for the good cooperation in the project, and Erwin R. Catesbeiana Jr. for excellent guidance through the Android ecosystem.

References

  1. 1.
  2. 2.
    Android Open Source Project. Dalvik Bytecode (2016). https://source.android.com/devices/tech/dalvik/dalvik-bytecode.html
  3. 3.
    Asavoae, I.M., Blasco, J., Chen, T.M., Kalutarage, H.K., Muttik, I., Nguyen, H.N., Roggenbach, M., Shaikh, S.A.: Towards automated Android app collusion detection (2016). CoRR, abs/1603.02308Google Scholar
  4. 4.
    Blasco, J., Chen, T.M., Muttik, I., Roggenbach, M.: Wild android collusions. In: Virus Bulletin (2016, to appear)Google Scholar
  5. 5.
    Bogdănaş, D., Roşu, G.: K-Java: a complete semantics of Java. In: POPL 2015. ACM (2015)Google Scholar
  6. 6.
    Bugiel, S., Davi, L., Dmitrienko, A., Heuser, S., Sadeghi, A.-R., Shastry, B.: Practical and lightweight domain isolation on Android. In: SPSM 2011. ACM (2011)Google Scholar
  7. 7.
    Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Talcott, C. (eds.): All About Maude - A High-Performance Logical Framework. LNCS, vol. 4350. Springer, Heidelberg (2007)zbMATHGoogle Scholar
  8. 8.
    Hathhorn, C., Ellison, C., Roşu, G.: Defining the undefinedness of c. In: PLDI 2015. ACM (2015)Google Scholar
  9. 9.
    Li, L., Bartel, A., Bissyandé, T.F., Klein, J., Traon, Y.L.: ApkCombiner: combining multiple android apps to support inter-app analysis. In: Federrath, H., Gollmann, D., Chakravarthy, S.R. (eds.) SEC 2015. IFIP AICT, vol. 455, pp. 513–527. Springer, Heidelberg (2015). doi: 10.1007/978-3-319-18467-8_34 CrossRefGoogle Scholar
  10. 10.
    Octeau, D., Luchaup, D., Dering, M., Jha, S., McDaniel, P.: Composite constant propagation: application to android inter-component communication analysis. In: ICSE 2015. IEEE Computer Society (2015)Google Scholar
  11. 11.
    Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., Traon, Y.L.: Effective inter-component communication mapping in android: an essential step towards holistic security analysis. In: Security Symposium. USENIX Association (2013)Google Scholar
  12. 12.
    Ravitch, T., Creswick, E.R., Tomb, A., Foltzer, A., Elliott, T., Casburn, L.: Multi-app security analysis with FUSE: statically detecting Android app collusion. In: ACSAC 2014. ACM (2014)Google Scholar
  13. 13.
    Roşu, G., Şerbănuţă, T.F.: An overview of the K semantic framework. J. Log. Algebr. Program. 79(6), 397–434 (2010)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Irina Măriuca Asăvoae
    • 1
  • Hoang Nga Nguyen
    • 2
  • Markus Roggenbach
    • 1
  • Siraj Shaikh
    • 2
  1. 1.Swansea UniversitySwanseaUK
  2. 2.Coventry UniversityCoventryUK

Personalised recommendations