{"title":"基于动态污点分析技术的Android软件漏洞挖掘框架","authors":"Zhao Min, Yang Haimin, Chen Ping, Yang Zhengxing","doi":"10.1109/ITNEC.2019.8729217","DOIUrl":null,"url":null,"abstract":"Security vulnerability mining is at the core of Android system security research. How to effectively exploit Android system security vulnerabilities has become an important technical means to enhance the security of smartphones and protect user security and privacy. An Android software vulnerability mining framework based on dynamic taint analysis technology is designed in this paper. Firstly, it analyzes the shortcomings of existing vulnerability mining technology, then gives the detailed design of the framework, and then discusses in detail the taint propagation analysis under Java context. Complete the switching between Java context and native context taint analysis environment at runtime, instruction preprocessing and other key techniques of Android vulnerability mining based on dynamic taint analysis theory. Finally, summarizes the whole paper and puts forward the problem worthy of further study.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Android software vulnerability mining framework based on dynamic taint analysis technology\",\"authors\":\"Zhao Min, Yang Haimin, Chen Ping, Yang Zhengxing\",\"doi\":\"10.1109/ITNEC.2019.8729217\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security vulnerability mining is at the core of Android system security research. How to effectively exploit Android system security vulnerabilities has become an important technical means to enhance the security of smartphones and protect user security and privacy. An Android software vulnerability mining framework based on dynamic taint analysis technology is designed in this paper. Firstly, it analyzes the shortcomings of existing vulnerability mining technology, then gives the detailed design of the framework, and then discusses in detail the taint propagation analysis under Java context. Complete the switching between Java context and native context taint analysis environment at runtime, instruction preprocessing and other key techniques of Android vulnerability mining based on dynamic taint analysis theory. Finally, summarizes the whole paper and puts forward the problem worthy of further study.\",\"PeriodicalId\":202966,\"journal\":{\"name\":\"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNEC.2019.8729217\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNEC.2019.8729217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Android software vulnerability mining framework based on dynamic taint analysis technology
Security vulnerability mining is at the core of Android system security research. How to effectively exploit Android system security vulnerabilities has become an important technical means to enhance the security of smartphones and protect user security and privacy. An Android software vulnerability mining framework based on dynamic taint analysis technology is designed in this paper. Firstly, it analyzes the shortcomings of existing vulnerability mining technology, then gives the detailed design of the framework, and then discusses in detail the taint propagation analysis under Java context. Complete the switching between Java context and native context taint analysis environment at runtime, instruction preprocessing and other key techniques of Android vulnerability mining based on dynamic taint analysis theory. Finally, summarizes the whole paper and puts forward the problem worthy of further study.