Proceedings of the 25th International Symposium on Software Testing and Analysis 2016
DOI: 10.1145/2931037.2931044
|View full text |Cite
|
Sign up to set email alerts
|

DroidRA: taming reflection to support whole-program analysis of Android apps

Abstract: Android developers heavily use reflection in their apps for legitimate reasons, but also significantly for hiding malicious actions. Unfortunately, current state-of-the-art static analysis tools for Android are challenged by the presence of reflective calls which they usually ignore. Thus, the results of their security analysis, e.g., for private data leaks, are inconsistent given the measures taken by malware writers to elude static detection. We propose the DroidRA instrumentationbased approach to address th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
94
0
2

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
3
3

Relationship

4
6

Authors

Journals

citations
Cited by 130 publications
(96 citation statements)
references
References 44 publications
0
94
0
2
Order By: Relevance
“…We found 185 (19%) piggybacked apps whose riders dynamically load code. Such schemes are often used by malware writers to break the control-flow of app, and thus challenge static detection of suspicious behaviour [30], [31]. Fig.…”
Section: F16mentioning
confidence: 99%
“…We found 185 (19%) piggybacked apps whose riders dynamically load code. Such schemes are often used by malware writers to break the control-flow of app, and thus challenge static detection of suspicious behaviour [30], [31]. Fig.…”
Section: F16mentioning
confidence: 99%
“…DroidRA [76] models the use of reflection with COAL [77] and reduces the resolution of reflective calls to a composite constant propagation problem.…”
Section: Related Workmentioning
confidence: 99%
“…The latter representations are derived from statement's type (e.g., if-statement, invoke-statement) instead of the exact statement string. These features have been introduced in previous work [1] not only to implement fast pairwise comparison but also to be resilient, to some extent, to obfuscation, i.e, the comparison will not be impacted in cases where variable names differ but will be impacted in cases where code structure changes (e.g., hide the real method call through reflection [10]). MPlugin further extracts all constants (numbers and strings) as features for comparison.…”
Section: A Feature Extractionmentioning
confidence: 99%