DocumentCode :
2179675
Title :
Exposing software security and availability risks for commercial mobile devices
Author :
Johnson, R. ; Zhaohui Wang ; Stavrou, Angelos ; Voas, J.
Author_Institution :
Dept. of Comput. Sci., George Mason Univ., Fairfax, VA, USA
fYear :
2013
fDate :
28-31 Jan. 2013
Firstpage :
1
Lastpage :
7
Abstract :
The advent of smaller, faster, and always connected handheld devices along with the ever-increasing reliance on technology for our everyday activities have introduced novel threats and risks. Beyond hardware security another primary factor that affects the reliability of the device is mobile applications. Indeed, the shift to smart commercially available mobile devices has created a pressing need for understanding the risks in using third-party mobile code running on the mobile devices. This new generation of smart devices and systems, including iPhone and Google Android, are powerful enough to accomplish most of the user tasks previously requiring a personal computer. In our paper, we discuss the cyber threats that stem from these new smart device capabilities and the on-line application markets for mobile devices. These threats include malware, data exfiltration, exploitation through USB, and user and data tracking. In this manuscript, we present our efforts towards a framework for exposing the functionality of a mobile application through a combination of static and dynamic program analysis that attempts to explore all available execution paths including libraries. We verified our approach by testing a large number of Android applications with our dynamic analysis framework to exhibit its functionality and viability. The framework allows complete automation of the execution process so that no user input is required. We also discuss how our static analysis output can be used to inform the execution of the dynamic analysis. Our approach can serve as an extensible basis to fulfill other useful purposes such as symbolic execution, program verification, interactive debugger, and other approaches that require deep inspection of an Android application. In summary, we believe that our efforts are the beginning of a long journey to asserting and exposing the risks of commercially available mobile devices. Our future work will include non-Android platforms.
Keywords :
formal verification; invasive software; mobile computing; program debugging; program diagnostics; smart phones; Google Android; cyber threat; data exfiltration; data tracking; dynamic program analysis; execution path; exploitation; handheld device; hardware security; iPhone; interactive debugger; malware; mobile device; online application market; program verification; software availability; software security; static program analysis; symbolic execution; third-party mobile code; user task; user tracking; Androids; Binary trees; Humanoid robots; Java; Registers; Smart phones; Switches; Android; Dynamic analysis; Execution coverage; Software reliability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reliability and Maintainability Symposium (RAMS), 2013 Proceedings - Annual
Conference_Location :
Orlando, FL
ISSN :
0149-144X
Print_ISBN :
978-1-4673-4709-9
Type :
conf
DOI :
10.1109/RAMS.2013.6517735
Filename :
6517735
Link To Document :
بازگشت