Android applications ship with several native C/C++ libraries. Research on Android security has revealed that these libraries often come from third-party components that are not kept up to date by developers, possibly posing security concerns. To assess if known vulnerabilities in these libraries constitute an immediate security problem, we need to understand whether vulnerable functions could be reached when apps are executed (we refer to this problem as function reachability). In this paper, we propose DroidReach, a novel, static approach to assess the reachability of native function calls in Android apps. Our framework addresses the limitations of state-of-the-art approaches by employing a combination of heuristics and symbolic execution, allowing for a more accurate reconstruction of the Inter-procedural Control-Flow Graphs (ICFGs). On the top 500 applications from the Google Play Store, DroidReach can detect a significantly higher number of paths in comparison to previous works. Finally, two case studies show how DroidReach can be used as a valuable vulnerability assessment tool.

Reach Me if You Can: On Native Vulnerability Reachability in Android Apps / Borzacchiello, L.; Coppa, E.; Maiorca, D.; Columbu, A.; Demetrescu, C.; Giacinto, G.. - 13556:(2022), pp. 701-722. (Intervento presentato al convegno 27th European Symposium on Research in Computer Security, ESORICS 2022 tenutosi a Copenhagen; Denmark) [10.1007/978-3-031-17143-7_34].

Reach Me if You Can: On Native Vulnerability Reachability in Android Apps

Borzacchiello L.;Coppa E.
;
Demetrescu C.
Penultimo
;
2022

Abstract

Android applications ship with several native C/C++ libraries. Research on Android security has revealed that these libraries often come from third-party components that are not kept up to date by developers, possibly posing security concerns. To assess if known vulnerabilities in these libraries constitute an immediate security problem, we need to understand whether vulnerable functions could be reached when apps are executed (we refer to this problem as function reachability). In this paper, we propose DroidReach, a novel, static approach to assess the reachability of native function calls in Android apps. Our framework addresses the limitations of state-of-the-art approaches by employing a combination of heuristics and symbolic execution, allowing for a more accurate reconstruction of the Inter-procedural Control-Flow Graphs (ICFGs). On the top 500 applications from the Google Play Store, DroidReach can detect a significantly higher number of paths in comparison to previous works. Finally, two case studies show how DroidReach can be used as a valuable vulnerability assessment tool.
2022
27th European Symposium on Research in Computer Security, ESORICS 2022
Android; Mobile security; Static analysis;
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps / Borzacchiello, L.; Coppa, E.; Maiorca, D.; Columbu, A.; Demetrescu, C.; Giacinto, G.. - 13556:(2022), pp. 701-722. (Intervento presentato al convegno 27th European Symposium on Research in Computer Security, ESORICS 2022 tenutosi a Copenhagen; Denmark) [10.1007/978-3-031-17143-7_34].
File allegati a questo prodotto
File Dimensione Formato  
Borzacchiello_Reach-Me_2022.pdf

accesso aperto

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Creative commons
Dimensione 1.36 MB
Formato Adobe PDF
1.36 MB Adobe PDF

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1659873
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact