MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search

Zicheng Zhang, Haoyu Ma, Daoyuan Wu*, Debin Gao, Xiao Yi, Yufan Chen, Yan Wu, Lingxiao Jiang

*Corresponding author for this work

Research output: Chapter in Book/Conference Proceeding/ReportConference Paper published in a bookpeer-review

3 Citations (Scopus)

Abstract

Modern Android apps consist of both host app code and third-party libraries. Traditional static analysis tools conduct taint analysis for API misuses on the entire app code, while third-party library (TPL) detection tools focus solely on library code. Both approaches, however, are prone to some inherent false negatives: taint analysis tools may neglect third-party libraries or face timeouts/errors in whole app-based analysis, and TPL detection tools are not designed for pinpointing specific vulnerable methods. These challenges underscore the need for enhanced identification of insecure methods in Android apps, particularly for app markets addressing open-source security incidents. In this paper, we aim to complement the identification of missed false negatives in both TPL detection and taint analysis by directly identifying clones of insecure methods, regardless of whether they are in the host app code or a shrunk library. We propose MtdScout, a novel crosslayer, method-level clone detection tool for Android apps. MtdScout generates bytecode signatures for flawed source methods using compiler-style interpretation and abstraction, and efficiently matches them with target app bytecode using signature-mapped search trees. Our experiment using ground-truth apps shows that MtdScout achieves the highest accuracy among three tested clone detection tools, with a precision of 92.5% and recall of 87.2%. A large-scale experiment with 23.9K apps from Google Play demonstrates MtdScout's effectiveness in complementing both LibScout and CryptoGuard by identifying numerous false negatives they missed due to app shrinking, method-only cloning, and inherent timeouts and failures in expensive taint analysis. Additionally, our experiment uncovers four security findings that highlight the disparities between MtdScout's methodlevel clone detection and package-level library detection.

Original languageEnglish
Title of host publicationProceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages724-740
Number of pages17
ISBN (Electronic)9798350354256
DOIs
Publication statusPublished - 2024
Event9th IEEE European Symposium on Security and Privacy, Euro S and P 2024 - Vienna, Austria
Duration: 8 Jul 202412 Jul 2024

Publication series

NameProceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024

Conference

Conference9th IEEE European Symposium on Security and Privacy, Euro S and P 2024
Country/TerritoryAustria
CityVienna
Period8/07/2412/07/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

Fingerprint

Dive into the research topics of 'MtdScout: Complementing the Identification of Insecure Methods in Android Apps via Source-to-Bytecode Signature Generation and Tree-based Layered Search'. Together they form a unique fingerprint.

Cite this