透過您的圖書館登入
IP:18.118.200.86
  • 期刊

系統化量測Android軟體檢測覆蓋率之方法設計與實作

摘要


在這個研究裡,我們提出一個以系統化的方式量測Android軟體檢測覆蓋率的方法。測量軟體檢測覆蓋率是用來理解一個動態分析工具能力的基礎。過去研究人員通常使用動態插入指令來測量軟體檢測覆蓋率。然而,這種方法只有在可以本機端完全受控的環境中才適用,同時常常也需要搭配原始碼進行檢測。我們主要透過產生靜態Android軟體修補的方法來進行檢測覆蓋率的量測。經過我們所修補的軟體可以同時用來測量本機和遠端的軟體檢測覆蓋率工具。我們的測量結果顯示目前市面上現有的軟體檢測覆蓋率大多介於10%到50%,表示這些工具仍有很大的空間可以改善。這些結果可以提供詳細的資訊給研究人員和開發人員,使他們對相關技術的能力有更徹底的了解以並提供可能的改善方向。

並列摘要


In this study, we propose a systematic approach that measures the code coverage of Android dynamic analysis tools. Code coverage measurement is a fundamental step in understanding the capabilities of such tools. Previously, researchers often measured code coverage by using dynamic instrumentations. However, dynamic it is effective only in certain controlled environments and, therefore, are only applicable to local applications having source codes. Our approach resolves the aforementioned problems by generating statically patched Android packages for profiling dynamic analysis tools. The generated packages can be used to measure the code coverage rate of both local and remote tools. The measurement results reveal that the code coverage rate for the evaluated tools is between 10%-50%, indicating that these tools still require improvement. The results provide detailed information for researchers and developers to thoroughly understand and improve dynamic analysis techniques.

參考文獻


Android, “UI/Application exerciser Monkey.”[Online]. Available: http://developer.android.com/tools/help/monkey.html
N. Antunes and M. Vieira, “Assessing and comparing vulnerability detection tools for web services: Benchmarking approach and examples,” IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 269-283, March-April 2015.
U. Bayer, C. Kruegel, and E. Kirda, “TTAnalyze: A tool for analyzing malware,”in Proceedings of the 15th European Institute for Computer Antivirus Research Annual Conference, ser. EICAR, 2006.
T. Blsing, L. Batyuk, A.-D. Schmidt, S. Camtepe, and S. Albayrak, “An android application sandbox system for suspicious software detection,” in Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE), Oct 2010, pp. 55-62.
D. Bruschi, L. Martignoni, and M. Monga, “Detecting selfmutating malware using control-flow graph matching,” in Proceedings of the 3rd International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 2006, pp. 129-143.

延伸閱讀