• DocumentCode
    3274205
  • Title

    Unintentional bugs to vulnerability mapping in Android applications

  • Author

    Bajwa, Garima ; Fazeen, Mohamed ; Dantu, Ram ; Tanpure, Sonal

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Univ. of North Texas Denton, Denton, TX, USA
  • fYear
    2015
  • fDate
    27-29 May 2015
  • Firstpage
    176
  • Lastpage
    178
  • Abstract
    The intention of an Android application, determined by the source code analysis is used to identify potential maliciousness in that application (app). Similarly, it is possible to analyze the unintentional behaviors of an app to identify and reduce the window of vulnerabilities. Unintentional behaviors of an app can be any developmental loopholes such as software bugs overlooked by a developer or introduced by an adversary intentionally. FindBugsTM and Android Lint are a couple of tools that can detect such bugs easily. A software bug can cause many security vulnerabilities (known or unknown) and vice-versa, thus, creating a many-to-many mapping. In our approach, we construct a matrix of mapping between the bugs and the potential vulnerabilities. A software bug detection tool is used to identify a list of bugs and create an empirical list of the vulnerabilities in an app. The many-to-many mapping matrix is obtained by two approaches - severity mapping and probability mapping. These mappings can be used as tools to measure the unknown vulnerabilities and their strength. We believe our study is the first of its kind and it can enhance the security of Android apps in their development phase itself. Also, the reverse mapping matrix (vulnerabilities to bugs) could be used to improve the accuracy of malware detection in Android apps.
  • Keywords
    Android (operating system); invasive software; matrix algebra; probability; program debugging; software tools; source code (software); Android Lint; Android applications; FindBugsTM; development phase; developmental loopholes; malware detection; many-to-many mapping matrix; probability mapping; reverse mapping matrix; security vulnerabilities; severity mapping; software bug detection tool; software bugs; source code analysis; unintentional behavior analysis; unintentional bugs; vulnerability mapping; Androids; Computer bugs; Conferences; Humanoid robots; Indexes; Security; Software; android applications; bugs; mapping; security; vulnerability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on
  • Conference_Location
    Baltimore, MD
  • Print_ISBN
    978-1-4799-9888-3
  • Type

    conf

  • DOI
    10.1109/ISI.2015.7165966
  • Filename
    7165966