|
|
1 | (6) |
|
1.1 Security Threats in Android Applications |
|
|
1 | (2) |
|
|
1 | (1) |
|
1.1.2 Software Vulnerabilities |
|
|
2 | (1) |
|
1.1.3 Information Leakage |
|
|
2 | (1) |
|
1.1.4 Insecure Descriptions |
|
|
2 | (1) |
|
1.2 A Semantics and Context Aware Approach to Android Application Security |
|
|
3 | (4) |
|
|
4 | (3) |
|
|
7 | (12) |
|
|
7 | (2) |
|
2.1.1 Android Framework API |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
2.1.4 Android App Description |
|
|
9 | (1) |
|
2.2 Android Malware Detection |
|
|
9 | (2) |
|
2.2.1 Signature Detection and Malware Analysis |
|
|
10 | (1) |
|
2.2.2 Android Malware Classification |
|
|
10 | (1) |
|
2.3 Android Application Vulnerabilities |
|
|
11 | (2) |
|
2.3.1 Component Hijacking Vulnerabilities |
|
|
11 | (1) |
|
2.3.2 Automatic Patch and Signature Generation |
|
|
12 | (1) |
|
|
12 | (1) |
|
2.3.4 Instrumentation Code Optimization |
|
|
13 | (1) |
|
2.4 Privacy Leakage in Android Apps |
|
|
13 | (1) |
|
2.4.1 Privacy Leakage Detection |
|
|
13 | (1) |
|
2.4.2 Privacy Leak Mitigation |
|
|
14 | (1) |
|
2.4.3 Information Flow Control |
|
|
14 | (1) |
|
2.5 Text Analytics for Android Security |
|
|
14 | (5) |
|
2.5.1 Automated Generation of Software Description |
|
|
15 | (1) |
|
|
15 | (4) |
|
3 Semantics-Aware Android Malware Classification |
|
|
19 | (26) |
|
|
19 | (2) |
|
|
21 | (2) |
|
|
21 | (1) |
|
3.2.2 Architecture Overview |
|
|
22 | (1) |
|
3.3 Weighted Contextual API Dependency Graph |
|
|
23 | (7) |
|
3.3.1 Key Behavioral Aspects |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (2) |
|
|
26 | (4) |
|
3.4 Android Malware Classification |
|
|
30 | (4) |
|
3.4.1 Graph Matching Score |
|
|
30 | (1) |
|
|
31 | (1) |
|
3.4.3 Implementation and Graph Database Query |
|
|
32 | (1) |
|
3.4.4 Malware Classification |
|
|
33 | (1) |
|
|
34 | (11) |
|
3.5.1 Dataset and Experiment Setup |
|
|
34 | (1) |
|
3.5.2 Summary of Graph Generation |
|
|
34 | (2) |
|
3.5.3 Classification Results |
|
|
36 | (4) |
|
3.5.4 Runtime Performance |
|
|
40 | (1) |
|
3.5.5 Effectiveness of Weight Generation and Weighted Graph Matching |
|
|
40 | (2) |
|
|
42 | (3) |
|
4 Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks |
|
|
45 | (18) |
|
|
45 | (2) |
|
4.2 Problem Statement and Approach Overview |
|
|
47 | (4) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (1) |
|
4.3 Taint Slice Computation |
|
|
51 | (1) |
|
|
51 | (1) |
|
4.4 Patch Statement Placement |
|
|
52 | (1) |
|
|
53 | (3) |
|
4.5.1 Optimized Patch for Running Example |
|
|
54 | (2) |
|
4.6 Experimental Evaluation |
|
|
56 | (7) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (2) |
|
|
60 | (3) |
|
5 Efficient and Context-Aware Privacy Leakage Confinement |
|
|
63 | (14) |
|
|
63 | (2) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (3) |
|
5.3.1 Taint Propagation Trace |
|
|
67 | (1) |
|
5.3.2 Source and Sink Call-Sites |
|
|
67 | (1) |
|
5.3.3 Parameterized Source and Sink Pairs |
|
|
68 | (1) |
|
|
69 | (1) |
|
5.4 Experimental Evaluation |
|
|
69 | (8) |
|
5.4.1 Summarized Analysis Results |
|
|
70 | (1) |
|
|
71 | (3) |
|
5.4.3 Runtime Performance |
|
|
74 | (1) |
|
|
75 | (2) |
|
6 Automatic Generation of Security-Centric Descriptions for Android Apps |
|
|
77 | (22) |
|
|
77 | (1) |
|
|
78 | (4) |
|
|
78 | (2) |
|
6.2.2 Architecture Overview |
|
|
80 | (2) |
|
6.3 Security Behavior Graph |
|
|
82 | (4) |
|
|
82 | (1) |
|
6.3.2 SBG of Motivating Example |
|
|
82 | (1) |
|
|
83 | (3) |
|
6.4 Behavior Mining and Graph Compression |
|
|
86 | (1) |
|
6.5 Description Generation |
|
|
87 | (5) |
|
6.5.1 Automatically Generated Descriptions |
|
|
87 | (1) |
|
6.5.2 Behavior Description Model |
|
|
88 | (2) |
|
6.5.3 Behavior Graph Translation |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (7) |
|
6.6.1 Correctness and Security-Awareness |
|
|
92 | (3) |
|
6.6.2 Readability and Effectiveness |
|
|
95 | (2) |
|
|
97 | (2) |
|
7 Limitation and Future Work |
|
|
99 | (6) |
|
7.1 Android Malware Classification |
|
|
99 | (1) |
|
7.2 Automated Vulnerability Patching |
|
|
100 | (1) |
|
7.3 Context-Aware Privacy Protection |
|
|
101 | (1) |
|
7.4 Automated Generation of Security-Centric Descriptions |
|
|
102 | (3) |
|
|
103 | (2) |
|
|
105 | |