Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/436
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBuddhadev B.en_US
dc.contributor.authorFaruki P.en_US
dc.contributor.authorGaur M.S.en_US
dc.contributor.authorKharche S.en_US
dc.contributor.authorZemmari A.en_US
dc.date.accessioned2023-11-30T08:33:16Z-
dc.date.available2023-11-30T08:33:16Z-
dc.date.issued2022-
dc.identifier.issn0377-2063-
dc.identifier.otherEID(2-s2.0-85081623597)-
dc.identifier.urihttps://dx.doi.org/10.1080/03772063.2020.1721338-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/436-
dc.description.abstractSmartphones are enriched by applications (apps) available through the mobile ecosystem. Various studies have reported that apps leaking sensitive user and device information are the primary target of cyber criminals. Existing program analysis tools can detect such information leakage flows. Reverse engineering tools are deployed to determine app information-flow via control and data-flow analysis. Malware authors employ information-flow based evasion techniques while leaking privacy sensitive data. In this paper, we discuss five novel app attacks that evade information flow analysis and leak sensitive device and user information (e.g. IMEI, SIM details, Location details, and user contacts). These attacks circumvent state-of-the-art analysis tools. We show that sensitive information can be leaked via non-sensitive variables, or by performing runtime inspection of classes and fields. We analyzed the proposed novel attack apps against some of the most promising state-of-the-art static analysis tools such as FlowDroid, DroidSafe, and dynamic analysis tools such as TaintDroid. Furthermore, we evaluated Play-Protect i.e. default on-device anti-malware, AVL Antivirus, and some other top commercial products against proposed novel app attacks. We demonstrate that existing tools are vulnerable to proposed attacks. Finally, this paper proposes AspectJ based runtime monitor as a possible solution that can be incorporated in the state-of-the-art app analysis techniques to detect information flow misuse. © 2022 IETE.en_US
dc.language.isoenen_US
dc.publisherTaylor and Francis Ltd.en_US
dc.sourceIETE Journal of Researchen_US
dc.subjectAndroid malwareen_US
dc.subjectFlow evasionen_US
dc.subjectRuntime information gatheringen_US
dc.subjectSensitive variablesen_US
dc.titleFloVasion: Towards Detection of non-sensitive Variable Based Evasive Information-Flow in Android Appsen_US
dc.typeJournal Articleen_US
Appears in Collections:Journal Article

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.