Projekte pro Jahr
Abstract
Many Android developers take advantage of third-party libraries and code snippets from public sources to add functionality to apps. Besides making development more productive, external code can also be harmful, introduce vulnerabilities, or raise critical privacy issues that threaten the security of sensitive user data and amplify an app's attack surface. Reliably recognizing such code fragments in Android applications is challenging due to the widespread use of obfuscation techniques and a variety of ways, how developers can express semantically similar program statements.
We propose a code recognition technique that is resilient against common code transformations and that excels in identifying code fragments and libraries in Android applications. Our method relies on obfuscation-resilient features from the Abstract Syntax Tree of methods and uses them in combination with invariant attributes from method signatures to derive well-characterizing fingerprints. To identify similar code, we elaborate an effective scoring metric that reliably compares fingerprints at method, class, and package level. We investigate how well our solution tackles obfuscated, shrunken, and optimized code by applying our technique to real-world applications. We thoroughly evaluate our solution and demonstrate its practical ability to fingerprint and recognize code with high precision and recall.
We propose a code recognition technique that is resilient against common code transformations and that excels in identifying code fragments and libraries in Android applications. Our method relies on obfuscation-resilient features from the Abstract Syntax Tree of methods and uses them in combination with invariant attributes from method signatures to derive well-characterizing fingerprints. To identify similar code, we elaborate an effective scoring metric that reliably compares fingerprints at method, class, and package level. We investigate how well our solution tackles obfuscated, shrunken, and optimized code by applying our technique to real-world applications. We thoroughly evaluate our solution and demonstrate its practical ability to fingerprint and recognize code with high precision and recall.
Originalsprache | englisch |
---|---|
Titel | 14th International Conference on Availability, Reliability and Security (ARES 2019) |
Erscheinungsort | New York |
Herausgeber (Verlag) | Association of Computing Machinery |
Seitenumfang | 10 |
ISBN (Print) | 978-1-4503-7164-3/19/08 |
DOIs | |
Publikationsstatus | Veröffentlicht - 2019 |
Veranstaltung | 14th International Conference on Availability, Reliability and Security: ARES 2019 - University of Kent, Canterbury, Großbritannien / Vereinigtes Königreich Dauer: 26 Aug. 2019 → 29 Aug. 2019 https://www.ares-conference.eu/ |
Konferenz
Konferenz | 14th International Conference on Availability, Reliability and Security |
---|---|
Kurztitel | ARES 2019 |
Land/Gebiet | Großbritannien / Vereinigtes Königreich |
Ort | Canterbury |
Zeitraum | 26/08/19 → 29/08/19 |
Internetadresse |
Fingerprint
Untersuchen Sie die Forschungsthemen von „Obfuscation-Resilient Code Recognition in Android Apps“. Zusammen bilden sie einen einzigartigen Fingerprint.Projekte
- 1 Laufend
-
A-SIT - Zentrum für sichere Informationstechnologie Austria
Stranacher, K., Dominikus, S., Leitold, H., Marsalek, A., Teufl, P., Bauer, W., Aigner, M. J., Rössler, T., Neuherz, E., Dietrich, K., Zefferer, T., Mangard, S., Payer, U., Orthacker, C., Lipp, P., Reiter, A., Knall, T., Bratko, H., Bonato, M., Suzic, B., Zwattendorfer, B., Kreuzhuber, S., Oswald, M. E., Tauber, A., Posch, R., Bratko, D., Feichtner, J., Ivkovic, M., Reimair, F., Wolkerstorfer, J. & Scheibelhofer, K.
21/05/99 → 31/12/24
Projekt: Arbeitsgebiet