Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/483
Full metadata record
DC FieldValueLanguage
dc.rights.licenseAll Open Access, Bronze-
dc.contributor.authorGajrani J.en_US
dc.contributor.authorTripathi M.en_US
dc.contributor.authorLaxmi V.en_US
dc.contributor.authorSomani G.en_US
dc.contributor.authorZemmari A.en_US
dc.contributor.authorGaur M.S.en_US
dc.date.accessioned2023-11-30T08:35:34Z-
dc.date.available2023-11-30T08:35:34Z-
dc.date.issued2020-
dc.identifier.issn2576-5337-
dc.identifier.otherEID(2-s2.0-85098041386)-
dc.identifier.urihttps://dx.doi.org/10.1145/3376121-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/483-
dc.description.abstractData security and privacy of Android users is one of the challenging security problems addressed by the security research community. A major source of the security vulnerabilities in Android apps is attributed to bugs within source code, insecure APIs, and unvalidated code before performing sensitive operations. Specifically, the major class of app vulnerabilities is related to the categories such as inter-component communication (ICC), networking, web, cryptographic APIs, storage, and runtime-permission validation. A major portion of current contributions focus on identifying a smaller subset of vulnerabilities. In addition, these methods do not discuss how to remove detected vulnerabilities from the affected code. In this work, we propose a novel vulnerability detection and patching framework, Vulvet, which employs static analysis approaches from different domains of program analysis for detection of a wide range of vulnerabilities in Android apps. We propose an additional light-weight technique, FP-Validation, to mitigate false positives in comparison to existing solutions owing to over-approximation. In addition to improved detection, Vulvet provides an automated patching of apps with safe code for each of the identified vulnerability using bytecode instrumentation. We implement Vulvet as an extension of Soot. To demonstrate the efficiency of our proposed framework, we analyzed 3,700 apps collected from various stores and benchmarks consisting of various weak implementations. Our results indicate that Vulvet is able to achieve vulnerability detection with 95.23% precision and 0.975 F-measure on benchmark appsen_US
dc.description.abstracta significant improvement in comparison to recent works along with successful patching of identified vulnerabilities. © 2020 ACM.en_US
dc.language.isoenen_US
dc.publisherAssociation for Computing Machineryen_US
dc.sourceDigital Threats: Research and Practiceen_US
dc.subjectAndroiden_US
dc.subjectprotectionen_US
dc.subjectsecurityen_US
dc.subjectstatic analysisen_US
dc.subjectvulnerabilitiesen_US
dc.titleVulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitationen_US
dc.typeJournal Articleen_US
Appears in Collections:Journal Article

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.