• English
    • français
  • Help
  •  | 
  • Contact
  •  | 
  • About
  •  | 
  • Login
  • HAL portal
  •  | 
  • Pages Pro
  • EN
  •  / 
  • FR
View Item 
  •   LillOA Home
  • Liste des unités
  • Centre de Recherche en Informatique, Signal et Automatique de Lille (CRIStAL) - UMR 9189
  • View Item
  •   LillOA Home
  • Liste des unités
  • Centre de Recherche en Informatique, Signal et Automatique de Lille (CRIStAL) - UMR 9189
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Static Analysis for Extracting Permission ...
  • BibTeX
  • CSV
  • Excel
  • RIS

Document type :
Article dans une revue scientifique
DOI :
10.1109/TSE.2014.2322867
Title :
Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android
Author(s) :
Bartel, Alexandre [Auteur]
Interdisciplinary Centre for Security, Reliability and Trust [Luxembourg] [SnT]
Klein, Jacques [Auteur]
Interdisciplinary Centre for Security, Reliability and Trust [Luxembourg] [SnT]
Monperrus, Martin [Auteur]
Self-adaptation for distributed services and large software systems [SPIRALS]
Le Traon, Yves [Auteur]
Interdisciplinary Centre for Security, Reliability and Trust [Luxembourg] [SnT]
Journal title :
IEEE Transactions on Software Engineering
Pages :
617-632
Publisher :
Institute of Electrical and Electronics Engineers
Publication date :
2014-06-02
ISSN :
0098-5589
English keyword(s) :
call-graph
permissions
large scale framework
Soot
static analysis
Java
Android
security
HAL domain(s) :
Informatique [cs]/Génie logiciel [cs.SE]
English abstract : [en]
A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions ...
Show more >
A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions than they actually need, which facilitates all kinds of malicious usage (e.g., through code injection). The analysis of permission-based framework requires a precise mapping between API methods of the framework and the permissions they require. In this paper, we show that naive static analysis fails miserably when applied with off-the-shelf components on the Android framework. We then present an advanced class-hierarchy and field-sensitive set of analyses to extract this mapping. Those static analyses are capable of analyzing the Android framework. They use novel domain specific optimizations dedicated to Android.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
  • Centre de Recherche en Informatique, Signal et Automatique de Lille (CRIStAL) - UMR 9189
Source :
Harvested from HAL
Files
Thumbnail
  • https://hal.inria.fr/hal-01055656/document
  • Open access
  • Access the document
Thumbnail
  • http://arxiv.org/pdf/1408.3976
  • Open access
  • Access the document
Thumbnail
  • https://hal.inria.fr/hal-01055656/document
  • Open access
  • Access the document
Université de Lille

Mentions légales
Université de Lille © 2017