Execution Recording and Reconstruction for Detecting Information Flows in Android Apps

Security researchers utilize taint analyses to uncover suspicious behaviors in Android apps. Current static taint analyzers cannot handle ICC, reflection, and lifecycles dependably, increasing the result verification cost. On the other hand, current dynamic taint trackers accurately detect execution...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2023-01, Vol.11, p.1-1
Hauptverfasser: Inayoshi, Hiroki, Kakei, Shohei, Saito, Shoichi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title IEEE access
container_volume 11
creator Inayoshi, Hiroki
Kakei, Shohei
Saito, Shoichi
description Security researchers utilize taint analyses to uncover suspicious behaviors in Android apps. Current static taint analyzers cannot handle ICC, reflection, and lifecycles dependably, increasing the result verification cost. On the other hand, current dynamic taint trackers accurately detect execution paths. However, they depend on specific Android versions and modified devices, reducing their usability and applicability. In addition, they require app exercise every time running the taint analysis. This paper presents a new dynamic taint tracker called T-Recs, tracking information flows by recording and reconstructing the app execution. First, before the taint analysis, the app's runtime data are obtained by instrumenting logging code into the app's bytecode and running the app to be independent of specific Android versions and devices. Then, T-Recs performs the taint analysis accurately with the logged data and separately from the app exercise. This paper is an extended version of our work published. Previously, T-Recs' accuracy was mainly evaluated in privacy leak detection. The results show that T-Recs outperforms compared analyzers, which are FlowDroid (w/ and w/o IC3), Amandroid, DroidSafe, and TaintDroid (w/ and w/o IntelliDroid). This paper also involves DroidRA and IccTA. This paper shows that T-Recs detects ICC- and reflection-related leaks missed by FlowDroid in popular Google Play apps. The other static analyzers fail to analyze most of the apps. These experiments also indicate an advantage of T-Recs: its users can re-execute T-Recs' taint analysis without re-exercising the app. T-Recs' app-runtime overhead and parallel execution performance were also evaluated, and the results are acceptable.
doi_str_mv 10.1109/ACCESS.2023.3240724
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10032128</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10032128</ieee_id><doaj_id>oai_doaj_org_article_94e94a9179a8446c8919b3cd153c6511</doaj_id><sourcerecordid>2774334173</sourcerecordid><originalsourceid>FETCH-LOGICAL-c409t-52657e5a6010bbdcfe4a91e296c041f69259db43313a53dbf80bb4985b5aa61c3</originalsourceid><addsrcrecordid>eNpNUV1LwzAUDaLgmPsF-lDwuTPfbR5L3XQwEJz6GtIkHR1bU5MO9d-btSK7L7nn3nNOLhwAbhGcIwTFQ1GWi81mjiEmc4IpzDC9ABOMuEgJI_zyrL8GsxB2MFYeRyybgI_Ft9XHvnFt8mq186Zpt4lqzYDa0PujHpa188mj7W1EkbBqIz6oYbPcu6-QNG1StMa7xiRF14UbcFWrfbCzv3cK3peLt_I5Xb88rcpinWoKRZ8yzFlmmeIQwaoyurZUCWSx4BpSVHOBmTAVJQQRxYip6jzSqMhZxZTiSJMpWI2-xqmd7HxzUP5HOtXIYeD8VirfN3pvpaBWnNwzoXJKuc4FEhXRBjGiOUMoet2PXp13n0cberlzR9_G8yXOsngERRmJLDKytHcheFv__4qgPOUhxzzkKQ_5l0dU3Y2qxlp7poAEI5yTX2LUhZc</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2774334173</pqid></control><display><type>article</type><title>Execution Recording and Reconstruction for Detecting Information Flows in Android Apps</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Inayoshi, Hiroki ; Kakei, Shohei ; Saito, Shoichi</creator><creatorcontrib>Inayoshi, Hiroki ; Kakei, Shohei ; Saito, Shoichi</creatorcontrib><description>Security researchers utilize taint analyses to uncover suspicious behaviors in Android apps. Current static taint analyzers cannot handle ICC, reflection, and lifecycles dependably, increasing the result verification cost. On the other hand, current dynamic taint trackers accurately detect execution paths. However, they depend on specific Android versions and modified devices, reducing their usability and applicability. In addition, they require app exercise every time running the taint analysis. This paper presents a new dynamic taint tracker called T-Recs, tracking information flows by recording and reconstructing the app execution. First, before the taint analysis, the app's runtime data are obtained by instrumenting logging code into the app's bytecode and running the app to be independent of specific Android versions and devices. Then, T-Recs performs the taint analysis accurately with the logged data and separately from the app exercise. This paper is an extended version of our work published. Previously, T-Recs' accuracy was mainly evaluated in privacy leak detection. The results show that T-Recs outperforms compared analyzers, which are FlowDroid (w/ and w/o IC3), Amandroid, DroidSafe, and TaintDroid (w/ and w/o IntelliDroid). This paper also involves DroidRA and IccTA. This paper shows that T-Recs detects ICC- and reflection-related leaks missed by FlowDroid in popular Google Play apps. The other static analyzers fail to analyze most of the apps. These experiments also indicate an advantage of T-Recs: its users can re-execute T-Recs' taint analysis without re-exercising the app. T-Recs' app-runtime overhead and parallel execution performance were also evaluated, and the results are acceptable.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3240724</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Analyzers ; Android security ; Androids ; Applications programs ; Codes ; Information flow ; Internet ; Leak detection ; Performance evaluation ; Privacy ; privacy leak detection ; Recording ; Runtime ; taint analysis ; Target tracking ; Usability</subject><ispartof>IEEE access, 2023-01, Vol.11, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c409t-52657e5a6010bbdcfe4a91e296c041f69259db43313a53dbf80bb4985b5aa61c3</citedby><cites>FETCH-LOGICAL-c409t-52657e5a6010bbdcfe4a91e296c041f69259db43313a53dbf80bb4985b5aa61c3</cites><orcidid>0000-0003-3355-8804 ; 0000-0003-3103-9656 ; 0000-0003-3137-4956</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10032128$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2095,27612,27903,27904,54912</link.rule.ids></links><search><creatorcontrib>Inayoshi, Hiroki</creatorcontrib><creatorcontrib>Kakei, Shohei</creatorcontrib><creatorcontrib>Saito, Shoichi</creatorcontrib><title>Execution Recording and Reconstruction for Detecting Information Flows in Android Apps</title><title>IEEE access</title><addtitle>Access</addtitle><description>Security researchers utilize taint analyses to uncover suspicious behaviors in Android apps. Current static taint analyzers cannot handle ICC, reflection, and lifecycles dependably, increasing the result verification cost. On the other hand, current dynamic taint trackers accurately detect execution paths. However, they depend on specific Android versions and modified devices, reducing their usability and applicability. In addition, they require app exercise every time running the taint analysis. This paper presents a new dynamic taint tracker called T-Recs, tracking information flows by recording and reconstructing the app execution. First, before the taint analysis, the app's runtime data are obtained by instrumenting logging code into the app's bytecode and running the app to be independent of specific Android versions and devices. Then, T-Recs performs the taint analysis accurately with the logged data and separately from the app exercise. This paper is an extended version of our work published. Previously, T-Recs' accuracy was mainly evaluated in privacy leak detection. The results show that T-Recs outperforms compared analyzers, which are FlowDroid (w/ and w/o IC3), Amandroid, DroidSafe, and TaintDroid (w/ and w/o IntelliDroid). This paper also involves DroidRA and IccTA. This paper shows that T-Recs detects ICC- and reflection-related leaks missed by FlowDroid in popular Google Play apps. The other static analyzers fail to analyze most of the apps. These experiments also indicate an advantage of T-Recs: its users can re-execute T-Recs' taint analysis without re-exercising the app. T-Recs' app-runtime overhead and parallel execution performance were also evaluated, and the results are acceptable.</description><subject>Analyzers</subject><subject>Android security</subject><subject>Androids</subject><subject>Applications programs</subject><subject>Codes</subject><subject>Information flow</subject><subject>Internet</subject><subject>Leak detection</subject><subject>Performance evaluation</subject><subject>Privacy</subject><subject>privacy leak detection</subject><subject>Recording</subject><subject>Runtime</subject><subject>taint analysis</subject><subject>Target tracking</subject><subject>Usability</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUV1LwzAUDaLgmPsF-lDwuTPfbR5L3XQwEJz6GtIkHR1bU5MO9d-btSK7L7nn3nNOLhwAbhGcIwTFQ1GWi81mjiEmc4IpzDC9ABOMuEgJI_zyrL8GsxB2MFYeRyybgI_Ft9XHvnFt8mq186Zpt4lqzYDa0PujHpa188mj7W1EkbBqIz6oYbPcu6-QNG1StMa7xiRF14UbcFWrfbCzv3cK3peLt_I5Xb88rcpinWoKRZ8yzFlmmeIQwaoyurZUCWSx4BpSVHOBmTAVJQQRxYip6jzSqMhZxZTiSJMpWI2-xqmd7HxzUP5HOtXIYeD8VirfN3pvpaBWnNwzoXJKuc4FEhXRBjGiOUMoet2PXp13n0cberlzR9_G8yXOsngERRmJLDKytHcheFv__4qgPOUhxzzkKQ_5l0dU3Y2qxlp7poAEI5yTX2LUhZc</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Inayoshi, Hiroki</creator><creator>Kakei, Shohei</creator><creator>Saito, Shoichi</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-3355-8804</orcidid><orcidid>https://orcid.org/0000-0003-3103-9656</orcidid><orcidid>https://orcid.org/0000-0003-3137-4956</orcidid></search><sort><creationdate>20230101</creationdate><title>Execution Recording and Reconstruction for Detecting Information Flows in Android Apps</title><author>Inayoshi, Hiroki ; Kakei, Shohei ; Saito, Shoichi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c409t-52657e5a6010bbdcfe4a91e296c041f69259db43313a53dbf80bb4985b5aa61c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Analyzers</topic><topic>Android security</topic><topic>Androids</topic><topic>Applications programs</topic><topic>Codes</topic><topic>Information flow</topic><topic>Internet</topic><topic>Leak detection</topic><topic>Performance evaluation</topic><topic>Privacy</topic><topic>privacy leak detection</topic><topic>Recording</topic><topic>Runtime</topic><topic>taint analysis</topic><topic>Target tracking</topic><topic>Usability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Inayoshi, Hiroki</creatorcontrib><creatorcontrib>Kakei, Shohei</creatorcontrib><creatorcontrib>Saito, Shoichi</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Inayoshi, Hiroki</au><au>Kakei, Shohei</au><au>Saito, Shoichi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Execution Recording and Reconstruction for Detecting Information Flows in Android Apps</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>11</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Security researchers utilize taint analyses to uncover suspicious behaviors in Android apps. Current static taint analyzers cannot handle ICC, reflection, and lifecycles dependably, increasing the result verification cost. On the other hand, current dynamic taint trackers accurately detect execution paths. However, they depend on specific Android versions and modified devices, reducing their usability and applicability. In addition, they require app exercise every time running the taint analysis. This paper presents a new dynamic taint tracker called T-Recs, tracking information flows by recording and reconstructing the app execution. First, before the taint analysis, the app's runtime data are obtained by instrumenting logging code into the app's bytecode and running the app to be independent of specific Android versions and devices. Then, T-Recs performs the taint analysis accurately with the logged data and separately from the app exercise. This paper is an extended version of our work published. Previously, T-Recs' accuracy was mainly evaluated in privacy leak detection. The results show that T-Recs outperforms compared analyzers, which are FlowDroid (w/ and w/o IC3), Amandroid, DroidSafe, and TaintDroid (w/ and w/o IntelliDroid). This paper also involves DroidRA and IccTA. This paper shows that T-Recs detects ICC- and reflection-related leaks missed by FlowDroid in popular Google Play apps. The other static analyzers fail to analyze most of the apps. These experiments also indicate an advantage of T-Recs: its users can re-execute T-Recs' taint analysis without re-exercising the app. T-Recs' app-runtime overhead and parallel execution performance were also evaluated, and the results are acceptable.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3240724</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0003-3355-8804</orcidid><orcidid>https://orcid.org/0000-0003-3103-9656</orcidid><orcidid>https://orcid.org/0000-0003-3137-4956</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2023-01, Vol.11, p.1-1
issn 2169-3536
2169-3536
language eng
recordid cdi_ieee_primary_10032128
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Analyzers
Android security
Androids
Applications programs
Codes
Information flow
Internet
Leak detection
Performance evaluation
Privacy
privacy leak detection
Recording
Runtime
taint analysis
Target tracking
Usability
title Execution Recording and Reconstruction for Detecting Information Flows in Android Apps
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T07%3A44%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Execution%20Recording%20and%20Reconstruction%20for%20Detecting%20Information%20Flows%20in%20Android%20Apps&rft.jtitle=IEEE%20access&rft.au=Inayoshi,%20Hiroki&rft.date=2023-01-01&rft.volume=11&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3240724&rft_dat=%3Cproquest_ieee_%3E2774334173%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2774334173&rft_id=info:pmid/&rft_ieee_id=10032128&rft_doaj_id=oai_doaj_org_article_94e94a9179a8446c8919b3cd153c6511&rfr_iscdi=true