SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications

  • Authors:
  • Cong Zheng;Shixiong Zhu;Shuaifu Dai;Guofei Gu;Xiaorui Gong;Xinhui Han;Wei Zou

  • Affiliations:
  • Beijing Key Laboratory of Internet Security Technology, Beijing & Peking University, Peking, China;Beijing Key Laboratory of Internet Security Technology, Beijing & Peking University, Peking, China;Beijing Key Laboratory of Internet Security Technology, Beijing & Peking University, Peking, China;Texas A&M University, College Station, TX, USA;Beijing Key Laboratory of Internet Security Technology, Beijing & Peking University, Peking, China;Beijing Key Laboratory of Internet Security Technology, Beijing & Peking University, Peking, China;Beijing Key Laboratory of Internet Security Technology, Beijing & Peking University, Peking, China

  • Venue:
  • Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

User interface (UI) interactions are essential to Android applications, as many Activities require UI interactions to be triggered. This kind of UI interactions could also help malicious apps to hide their sensitive behaviors (e.g., sending SMS or getting the user's device ID) from being detected by dynamic analysis tools such as TaintDroid, because simply running the app, but without proper UI interactions, will not lead to the exposure of sensitive behaviors. In this paper we focus on the challenging task of triggering a certain behavior through automated UI interactions. In particular, we propose a hybrid static and dynamic analysis method to reveal UI-based trigger conditions in Android applications. Our method first uses static analysis to extract expected activity switch paths by analyzing both Activity and Function Call Graphs, and then uses dynamic analysis to traverse each UI elements and explore the UI interaction paths towards the sensitive APIs. We implement a prototype system SmartDroid and show that it can automatically and efficiently detect the UI-based trigger conditions required to expose the sensitive behavior of several Android malwares, which otherwise cannot be detected with existing techniques such as TaintDroid.