IccTA

Detecting inter-component privacy leaks in android apps

Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon, Steven Arzt, Siegfried Rasthofer, Eric Bodden, Damien Octeau, Patrick McDaniel

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

233 Citations (Scopus)

Abstract

Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. At installation, this application is given permission to (1) access the Internet (for updating wallpapers) and (2) use the device microphone (to change background following noise changes). With these permissions, the application could silently record user conversations and upload them remotely. To give more confidence about how Shake Them All actually processes what it records, it is necessary to build a precise analysis tool that tracks the flow of any sensitive data from its source point to any sink, especially if those are in different components. Since Android applications may leak private data carelessly or maliciously, we propose IccTA, a static taint analyzer to detect privacy leaks among components in Android applications. IccTA goes beyond state-of-the-art approaches by supporting intercomponent detection. By propagating context information among components, IccTA improves the precision of the analysis. IccTA outperforms existing tools on two benchmarks for ICC-leak detectors: DroidBench and ICC-Bench. Moreover, our approach detects 534 ICC leaks in 108 apps from MalGenome and 2,395 ICC leaks in 337 apps in a set of 15,000 Google Play apps.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015
PublisherIEEE Computer Society
Pages280-291
Number of pages12
Volume1
ISBN (Electronic)9781479919345
DOIs
Publication statusPublished - 12 Aug 2015
Externally publishedYes
EventInternational Conference on Software Engineering 2015 - Florence, Italy
Duration: 16 May 201524 May 2015
Conference number: 37th
http://2015.icse-conferences.org/

Conference

ConferenceInternational Conference on Software Engineering 2015
Abbreviated titleICSE 2015
CountryItaly
CityFlorence
Period16/05/1524/05/15
Internet address

Cite this

Li, L., Bartel, A., Bissyandé, T. F., Klein, J., Traon, Y. L., Arzt, S., ... McDaniel, P. (2015). IccTA: Detecting inter-component privacy leaks in android apps. In Proceedings - 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015 (Vol. 1, pp. 280-291). [7194581] IEEE Computer Society. https://doi.org/10.1109/ICSE.2015.48
Li, Li ; Bartel, Alexandre ; Bissyandé, Tegawendé F. ; Klein, Jacques ; Traon, Yves Le ; Arzt, Steven ; Rasthofer, Siegfried ; Bodden, Eric ; Octeau, Damien ; McDaniel, Patrick. / IccTA : Detecting inter-component privacy leaks in android apps. Proceedings - 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015. Vol. 1 IEEE Computer Society, 2015. pp. 280-291
@inproceedings{ec8505c1aad548bf89f016849017e2e7,
title = "IccTA: Detecting inter-component privacy leaks in android apps",
abstract = "Shake Them All is a popular {"}Wallpaper{"} application exceeding millions of downloads on Google Play. At installation, this application is given permission to (1) access the Internet (for updating wallpapers) and (2) use the device microphone (to change background following noise changes). With these permissions, the application could silently record user conversations and upload them remotely. To give more confidence about how Shake Them All actually processes what it records, it is necessary to build a precise analysis tool that tracks the flow of any sensitive data from its source point to any sink, especially if those are in different components. Since Android applications may leak private data carelessly or maliciously, we propose IccTA, a static taint analyzer to detect privacy leaks among components in Android applications. IccTA goes beyond state-of-the-art approaches by supporting intercomponent detection. By propagating context information among components, IccTA improves the precision of the analysis. IccTA outperforms existing tools on two benchmarks for ICC-leak detectors: DroidBench and ICC-Bench. Moreover, our approach detects 534 ICC leaks in 108 apps from MalGenome and 2,395 ICC leaks in 337 apps in a set of 15,000 Google Play apps.",
author = "Li Li and Alexandre Bartel and Bissyand{\'e}, {Tegawend{\'e} F.} and Jacques Klein and Traon, {Yves Le} and Steven Arzt and Siegfried Rasthofer and Eric Bodden and Damien Octeau and Patrick McDaniel",
year = "2015",
month = "8",
day = "12",
doi = "10.1109/ICSE.2015.48",
language = "English",
volume = "1",
pages = "280--291",
booktitle = "Proceedings - 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015",
publisher = "IEEE Computer Society",
address = "United States of America",

}

Li, L, Bartel, A, Bissyandé, TF, Klein, J, Traon, YL, Arzt, S, Rasthofer, S, Bodden, E, Octeau, D & McDaniel, P 2015, IccTA: Detecting inter-component privacy leaks in android apps. in Proceedings - 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015. vol. 1, 7194581, IEEE Computer Society, pp. 280-291, International Conference on Software Engineering 2015, Florence, Italy, 16/05/15. https://doi.org/10.1109/ICSE.2015.48

IccTA : Detecting inter-component privacy leaks in android apps. / Li, Li; Bartel, Alexandre; Bissyandé, Tegawendé F.; Klein, Jacques; Traon, Yves Le; Arzt, Steven; Rasthofer, Siegfried; Bodden, Eric; Octeau, Damien; McDaniel, Patrick.

Proceedings - 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015. Vol. 1 IEEE Computer Society, 2015. p. 280-291 7194581.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - IccTA

T2 - Detecting inter-component privacy leaks in android apps

AU - Li, Li

AU - Bartel, Alexandre

AU - Bissyandé, Tegawendé F.

AU - Klein, Jacques

AU - Traon, Yves Le

AU - Arzt, Steven

AU - Rasthofer, Siegfried

AU - Bodden, Eric

AU - Octeau, Damien

AU - McDaniel, Patrick

PY - 2015/8/12

Y1 - 2015/8/12

N2 - Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. At installation, this application is given permission to (1) access the Internet (for updating wallpapers) and (2) use the device microphone (to change background following noise changes). With these permissions, the application could silently record user conversations and upload them remotely. To give more confidence about how Shake Them All actually processes what it records, it is necessary to build a precise analysis tool that tracks the flow of any sensitive data from its source point to any sink, especially if those are in different components. Since Android applications may leak private data carelessly or maliciously, we propose IccTA, a static taint analyzer to detect privacy leaks among components in Android applications. IccTA goes beyond state-of-the-art approaches by supporting intercomponent detection. By propagating context information among components, IccTA improves the precision of the analysis. IccTA outperforms existing tools on two benchmarks for ICC-leak detectors: DroidBench and ICC-Bench. Moreover, our approach detects 534 ICC leaks in 108 apps from MalGenome and 2,395 ICC leaks in 337 apps in a set of 15,000 Google Play apps.

AB - Shake Them All is a popular "Wallpaper" application exceeding millions of downloads on Google Play. At installation, this application is given permission to (1) access the Internet (for updating wallpapers) and (2) use the device microphone (to change background following noise changes). With these permissions, the application could silently record user conversations and upload them remotely. To give more confidence about how Shake Them All actually processes what it records, it is necessary to build a precise analysis tool that tracks the flow of any sensitive data from its source point to any sink, especially if those are in different components. Since Android applications may leak private data carelessly or maliciously, we propose IccTA, a static taint analyzer to detect privacy leaks among components in Android applications. IccTA goes beyond state-of-the-art approaches by supporting intercomponent detection. By propagating context information among components, IccTA improves the precision of the analysis. IccTA outperforms existing tools on two benchmarks for ICC-leak detectors: DroidBench and ICC-Bench. Moreover, our approach detects 534 ICC leaks in 108 apps from MalGenome and 2,395 ICC leaks in 337 apps in a set of 15,000 Google Play apps.

UR - http://www.scopus.com/inward/record.url?scp=84943159826&partnerID=8YFLogxK

U2 - 10.1109/ICSE.2015.48

DO - 10.1109/ICSE.2015.48

M3 - Conference Paper

VL - 1

SP - 280

EP - 291

BT - Proceedings - 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015

PB - IEEE Computer Society

ER -

Li L, Bartel A, Bissyandé TF, Klein J, Traon YL, Arzt S et al. IccTA: Detecting inter-component privacy leaks in android apps. In Proceedings - 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015. Vol. 1. IEEE Computer Society. 2015. p. 280-291. 7194581 https://doi.org/10.1109/ICSE.2015.48