Authors
Dragos Sbîrlea, Michael G Burke, Salvatore Guarnieri, Marco Pistoia, Vivek Sarkar
Publication date
2013/11/14
Journal
IBM Journal of Research and Development
Volume
57
Issue
6
Pages
10: 1-10: 12
Publisher
IBM
Description
The Android® operating system builds upon already well-established permission systems but complements them by allowing application components to be reused within and across applications through a single communication mechanism, called the Intent mechanism. In this paper, we describe techniques that we developed for statically detecting Android application vulnerability to attacks that obtain unauthorized access to permission-protected information. We address three kinds of such attacks, known as confused deputy, permission collusion, and Intent spoofing. We show that application vulnerability to these attacks can be detected using taint analysis. Based on this technique, we developed PermissionFlow, a tool for discovering vulnerabilities in the byte code and configuration of Android applications. To enable PermissionFlow analysis, we developed a static technique for automatic identification of …
Total citations
201320142015201620172018201920202021202220232024171513181712132542
Scholar articles
D Sbîrlea, MG Burke, S Guarnieri, M Pistoia, V Sarkar - IBM Journal of Research and Development, 2013