1
WebVbased Security Analysis Tool for Android Applications Computer Science DepartmentP Metropolitan College Nebiyu FelekeP Tandhy SimanjuntakP Wenjie ShiP Yuting ZhangP Lou Chitkushev naberraP tandhyP wjshiP danazhP [email protected] OnNgoing Work Architecture Our Tool Other WebNbased Analysis Tools Motivation www.idc.com www.kaspersky.com Every fifth AndroidVbased device with Kaspersky solutions was attacked by malware during reported period www.kaspersky.com Anubis A web portal of android applications security Application Security Analysis based on Category Proposed Work Implicit Open omponents in Finance and Medical Applications A framework to analyze the security of android applications through static analysis Propose and implement a number of metrics complementary to those in many existing webNbased analysis tools: Identify Root Exploit and Malicious Domain Identify Hidden File and Code Loading Identify Open Components Identify Dangerous Permissions Combination Identify ReNDelegation Identify Over Privilege Analysis Tool Page Search Tool Page Application Security Evolution Analysis Identify and classify applications with similar functionality based on applicationsE descriptions using keyword analysis Investigate the association between keywords and other security metrics such as permissions Perform both individual and collective analysis ReNdelegation Open Components OverNprivilege Dangerous Permissions Combination Hidden Files Malicious Domains Root Exploit Code Loading Types of Metrics Changed Proposed Work Identify more security metrics that can be used for evolution analysis, including those used in other existing tools Investigate the possible security evolution patterns of applications Distribution of Added Vulnerabilities Distribution of Deleted Vulnerabilities Investigate the possible security patterns of applications with similar functionality Number of Types of Metrics Changed Percentage of Dataset Metrics include: Details of Three Metrics Type of Metrics Percentage of Dataset Number of Added Vulnerabilities Percentage of Applicable Dataset Percentage of Applicable Dataset Number of Deleted Vulnerabilities Total Downloaded Applications based on Category Percentage of Root Exploit Applications based on Category Total Number Category Total Percentage Category Total Percentage Percentage of Total Over Privilege Applications based on Category Category Investigate possible update attacks, particularly through anomaly detection

Web-based Security Analysis Tool for Android Applications

Embed Size (px)

DESCRIPTION

a web-based security analysis tool for android applications poster session at Advanced Cyber Security Center Annual Conference 2014, Boston, Nov 5th, 2014.

Citation preview

Page 1: Web-based Security Analysis Tool for Android Applications

WebVbasedhSecurityhAnalysishToolhforhAndroidhApplicationsComputerhSciencehDepartmentPhMetropolitanhCollege

NebiyuhFelekePhTandhyhSimanjuntakPhWenjiehShiPhYutinghZhangPhLouhChitkushevhhnaberraPhtandhyPhwjshiPhdanazhPhltc@bu.edu

OnNgoingIWork

Architecture

OurITool

OtherIWebNbasedIAnalysisITools

Motivation

www.idc.com

www.kaspersky.com

EveryhfifthhAndroidVbasedhdevicehwithhKasperskyhsolutionshwashattackedhbyhmalwarehduringhreportedhperiod

www.kaspersky.com

Anubis

AIwebIportalIofIandroidIapplicationsIsecurity

ApplicationISecurityIAnalysisIbasedIonICategory

ProposedIWork

ImplicitIOpenIomponentsIinIFinanceIandIMedicalIApplications

AIframeworkItoIanalyzeItheIsecurityIofIandroidIapplicationsIthroughIstaticIanalysis

ProposeIandIimplementIaInumberIofImetricsIcomplementaryItoIthoseIinImanyIexistingIwebNbasedIanalysisItools:

IdentifyIRootIExploitIandIMaliciousIDomain

IdentifyIHiddenIFileIandICodeILoading

IdentifyIOpenIComponents

IdentifyIDangerousIPermissionsICombinationI

IdentifyIReNDelegation

IdentifyIOverIPrivilege

AnalysishToolhPage

SearchhToolhPage

ApplicationISecurityIEvolutionIAnalysis

IdentifyIandIclassifyIapplicationsIwithIsimilarfunctionalityIbasedIonIapplicationsEIdescriptionsIusingIkeywordIanalysis

InvestigateItheIassociationIbetweenIkeywordsIandotherIsecurityImetricsIsuchIasIpermissions

PerformIbothIindividualIandIcollectiveIanalysis

ReNdelegationOpenIComponentsOverNprivilegeDangerousIPermissionsICombinationHiddenIFilesMaliciousIDomainsRootIExploitCodeILoading

TypesIofIMetricsIChangedI

ProposedIWorkIdentifyImoreIsecurityImetricsIthatIcanIbeusedIforIevolutionIanalysis,IincludingIthoseusedIinIotherIexistingItools

InvestigateItheIpossibleIsecurityIevolutionpatternsIofIapplications

DistributionhofhAddedhVulnerabilities DistributionhofhDeletedhVulnerabilities

InvestigateItheIpossibleIsecurityIpatternsIofIapplicationsIwithIsimilarIfunctionality

NumberIofITypesIofIMetricsIChangedI

Per

cen

tage

IofI

Dat

aset

I

MetricsIinclude:

DetailsIofIThreeIMetricsI

TypeIofIMetricsI

Per

cen

tage

IofI

Dat

aset

I

NumberIofIAddedIVulnerabilitiesI

Per

cen

tage

IofI

Ap

plic

able

IDat

aset

I

Per

cen

tage

IofI

Ap

plic

able

IDat

aset

I

NumberIofIDeletedIVulnerabilitiesI

TotalIDownloadedIApplicationsIbasedIonICategory

IPercentageIofIRootIExploitIApplicationsIbasedIonICategory

Tota

lINu

mb

erI

Category

Tota

lIPer

cen

tage

I

Category

Tota

lIPer

cen

tage

I

PercentageIofITotalIOverIPrivilegeIApplicationsIbasedIonICategory

Category

InvestigateIpossibleIupdateIattacks,particularlyIthroughIanomalyIdetection