skip to main content
10.1145/1999732.1999740acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Vision: automated security validation of mobile apps at app markets

Published:28 June 2011Publication History

ABSTRACT

Smartphones and "app" markets are raising concerns about how third-party applications may misuse or improperly handle users' privacy-sensitive data. Fortunately, unlike in the PC world, we have a unique opportunity to improve the security of mobile applications thanks to the centralized nature of app distribution through popular app markets. Thorough validation of apps applied as part of the app market admission process has the potential to significantly enhance mobile device security. In this paper, we propose AppInspector, an automated security validation system that analyzes apps and generates reports of potential security and privacy violations. We describe our vision for making smartphone apps more secure through automated validation and outline key challenges such as detecting and analyzing security and privacy violations, ensuring thorough test coverage, and scaling to large numbers of apps.

References

  1. Amazon mechanical turk. www.mturk.com.Google ScholarGoogle Scholar
  2. Android market. market.android.com.Google ScholarGoogle Scholar
  3. Apple sued over apps privacy issues; google may be next. www.reuters.com/assets/print?aid=USTRE6BR1Y820101228.Google ScholarGoogle Scholar
  4. iphone and android apps breach privacy. www.foxnews.com/scitech/2010/12/18/apps-watching/.Google ScholarGoogle Scholar
  5. Malware infects more than 50 android apps. www.msnbc.msn.com/id/41867328/ns/technology_and_science-security/.Google ScholarGoogle Scholar
  6. More than 60 apps have been downloaded for every iOS device sold. http://www.asymco.com/2011/01/16/more-than-60-apps-have-been-downloaded-for-every-ios-device-sold/.Google ScholarGoogle Scholar
  7. P3P 1.1 Specification. http://www.w3.org/TR/P3P11/.Google ScholarGoogle Scholar
  8. Your apps are watching you. online.wsj.com/article/SB10001424052748704694004576020083703574602.html.Google ScholarGoogle Scholar
  9. Flashlight app sneaks tethering into app store (for now) {pulled}. www.macrumors.com, July 2010.Google ScholarGoogle Scholar
  10. J. Burnim and K. Sen. Heuristics for scalable dynamic test generation. In TR UCB/EECS-2008-123, 2008.Google ScholarGoogle Scholar
  11. C. Cadar, D. Dunbar, and D. R. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: Automatically generating inputs of death. In ACM CCS, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Candea, S. Bucur, and C. Zamfir. Automated software testing as a service. In ACM SOCC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. V. Chipounov, V. Kuznetsov, and G. Candea. S2E: A platform for in-vivo multi-path analysis of software systems. In ASPLOS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. CloneCloud: Elastic execution between mobile device and cloud. In EuroSys, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Ciortea, C. Zamfir, S. Bucur, V. Chipounov, and G. Candea. Cloud9: A software testing service. In LADIS, 2009.Google ScholarGoogle Scholar
  17. J. Clause, W. Li, and A. Orso. Dytan: A generic dynamic taint analysis framework. In ISSTA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Egele, C. Kruegel, E. Kirda, and G. Vigna. PiOS: Detecting privacy leaks in ios applications. In NDSS, 2011.Google ScholarGoogle Scholar
  19. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. G. Kang, S. McCamant, P. Poosankam, and D. Song. DTA++: Dynamic taint analysis with targeted control-flow propagation. In NDSS, 2011.Google ScholarGoogle Scholar
  21. J. C. King. Symbolic execution and program testing. Communications of the ACM, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. T. King and P. M. Chen. Backtracking intrusions. In SOSP, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In NDSS, 2005.Google ScholarGoogle Scholar
  24. J. Oberheide, E. Cooke, and F. Jahanian. CloudAV: N-version antivirus in the network cloud. In USENIX Security, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid android: Versatile protection for smartphones. In ACSAC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. K. Sen, D. Marinov, and G. Agha. CUTE: A concolic unit testing engine for c. In FSE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. E. Smith. iPhone applications & privacy issues: An analysis of application transmission of iPhone unique device identifiers (UDIDs). In Technical Report, 2010.Google ScholarGoogle Scholar
  28. H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In ACM CCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Vision: automated security validation of mobile apps at app markets

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MCS '11: Proceedings of the second international workshop on Mobile cloud computing and services
      June 2011
      40 pages
      ISBN:9781450307383
      DOI:10.1145/1999732

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 June 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate8of12submissions,67%

      Upcoming Conference

      MOBISYS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader