So {U} R CERER: Developer-Driven Security Testing Framework for Android Apps

Muhammad Sajidur Rahman, Blas Kojusner, Ryon Kennedy, Prerit Pathak, Lin Qi, Byron J. Williams
{"title":"So {U} R CERER: Developer-Driven Security Testing Framework for Android Apps","authors":"Muhammad Sajidur Rahman, Blas Kojusner, Ryon Kennedy, Prerit Pathak, Lin Qi, Byron J. Williams","doi":"10.1109/ASEW52652.2021.00020","DOIUrl":null,"url":null,"abstract":"Frequently advised secure development recommendations often fall short in practice for app developers. Tool-driven (e.g., using static analysis tools) approaches lack context and domain-specific requirements of an app being tested. App developers struggle to find an actionable and prioritized list of vulnerabilities from a laundry list of security warnings reported by static analysis tools. Process-driven (e.g., applying threat modeling methods) approaches require substantial resources (e.g., security testing team, budget) and security expertise, which small to medium-scale app dev teams could barely afford. To help app developers securing their apps, we propose SO{U}RCERER11Sourcerer is a fictional character depicted in the fantasy novel series ‘Discworld’ written by Terry Pratchett. https://discworld.fandom.com/wiki/Sourcerer, a guiding framework for Android app developers for security testing. So{u}rcererguides developers to identify domain-specific assets of an app, detect and prioritize vulnerabilities, and mitigate those vulnerabilities based on secure development guidelines. We evaluated So{u}rcererwith a case study on analyzing and testing 36 Android mobile money apps. We found that by following activities guided by So{ U} Rcerer,an app developer could get a concise and actionable list of vulnerabilities (24–61 % fewer security warnings produced by So{u}rcererthan a standalone static analyzer), directly affecting a mobile money app's critical assets, and devise a mitigation plan. Our findings from this preliminary study indicate a viable approach to Android app security testing without being overwhelmingly complex for app developers.","PeriodicalId":349977,"journal":{"name":"2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","volume":"31 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASEW52652.2021.00020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Frequently advised secure development recommendations often fall short in practice for app developers. Tool-driven (e.g., using static analysis tools) approaches lack context and domain-specific requirements of an app being tested. App developers struggle to find an actionable and prioritized list of vulnerabilities from a laundry list of security warnings reported by static analysis tools. Process-driven (e.g., applying threat modeling methods) approaches require substantial resources (e.g., security testing team, budget) and security expertise, which small to medium-scale app dev teams could barely afford. To help app developers securing their apps, we propose SO{U}RCERER11Sourcerer is a fictional character depicted in the fantasy novel series ‘Discworld’ written by Terry Pratchett. https://discworld.fandom.com/wiki/Sourcerer, a guiding framework for Android app developers for security testing. So{u}rcererguides developers to identify domain-specific assets of an app, detect and prioritize vulnerabilities, and mitigate those vulnerabilities based on secure development guidelines. We evaluated So{u}rcererwith a case study on analyzing and testing 36 Android mobile money apps. We found that by following activities guided by So{ U} Rcerer,an app developer could get a concise and actionable list of vulnerabilities (24–61 % fewer security warnings produced by So{u}rcererthan a standalone static analyzer), directly affecting a mobile money app's critical assets, and devise a mitigation plan. Our findings from this preliminary study indicate a viable approach to Android app security testing without being overwhelmingly complex for app developers.
所以{U} R CERER:开发者驱动的Android应用程序安全测试框架
通常建议的安全开发建议在应用程序开发人员的实践中往往不足。工具驱动(例如,使用静态分析工具)的方法缺乏被测试应用的上下文和领域特定需求。应用程序开发人员很难从静态分析工具报告的安全警告列表中找到一个可操作的、优先级高的漏洞列表。过程驱动(例如,应用威胁建模方法)的方法需要大量的资源(例如,安全测试团队,预算)和安全专业知识,这是中小型应用程序开发团队几乎负担不起的。为了帮助应用程序开发人员保护他们的应用程序,我们建议RCERER11Sourcerer是Terry Pratchett写的奇幻小说《碟形世界》系列中的虚构人物。https://discworld.fandom.com/wiki/Sourcerer,为Android应用开发者提供安全测试的指导框架。因此{u} erererguide引导开发人员识别应用程序的特定领域资产,检测和优先考虑漏洞,并根据安全开发指南缓解这些漏洞。我们通过分析和测试36个Android移动支付应用的案例研究来评估So{u} erver。我们发现,通过遵循So{U} Rcerer指导的活动,应用程序开发人员可以获得简洁且可操作的漏洞列表(So{U} Rcerer产生的安全警告比独立的静态分析器少24 - 61%),直接影响移动货币应用程序的关键资产,并制定缓解计划。我们从初步研究中得出的结论表明,Android应用安全测试是一种可行的方法,对应用开发者来说并不十分复杂。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信