Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Archivio istituziona...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
DBLP
Doctoral thesis
Data sources: DBLP
versions View all 2 versions
addClaim

Dealing with Security and Privacy Challenges in Android through App Code Analysis.

Authors: PAGANO, FRANCESCO;

Dealing with Security and Privacy Challenges in Android through App Code Analysis.

Abstract

As smartphones store vast amounts of personal data, apps must access this data in compliance with privacy policies and regulations like GDPR. However, apps can sometimes collect and transmit user information without fully adhering to these policies. Additionally, third-party libraries integrated into apps can access user data without the developers’ full knowledge, increasing privacy risks. Vulnerabilities in app code further compromise user data and privacy, allowing malicious actors to steal sensitive information. Code analysis provides a robust solution to these challenges by thoroughly examining app functionalities, identifying vulnerabilities, and uncovering potential risks related to user information extraction. This Ph.D. thesis focuses on static code analysis techniques to address security and privacy issues in Android apps and their connected client systems. It introduces the HideDroid and MarvelHideDroid techniques to mitigate unauthorized exfiltration of user information by apps, and the SEBASTiAn and MITHRAS techniques to identify and exploit security vulnerabilities in both apps and the systems they communicate with. HideDroid is the first methodology to anonymize user information in requests sent to analytics services, safeguarding user identity while preserving data utility. It overcomes current solutions that merely block all network requests to analytics services, which deprives developers of valuable insights. MarvelHideDroid prevents app execution monitoring techniques, such as dynamic instrumentation and virtualization, from extracting complete user information during runtime by injecting anonymization logic directly into the app’s compiled code. SEBASTiAn statically identifies app vulnerabilities by analyzing only the app’s Control Flow Graph (CFG), overcoming current solutions that target outdated Android versions or non-existent vulnerabilities, and that struggle with hybrid apps. This thesis also presents the first study comparing vulnerabilities in original versus obfuscated apps, assessing how obfuscation impacts the effectiveness of Static Application Security Testing (SAST) tools. MITHRAS automates code analysis for both IoT device firmware and its companion app, using Deep Reinforcement Learning (Deep RL) to maliciously modify app requests and exploit Remote Code Execution (RCE) vulnerabilities in IoT devices, addressing gaps in existing solutions that focus solely on crashing the IoT device through its companion app.

Country
Italy
Keywords

Android; Privacy; IoT; vulnerability detection; deep reinforcement learning; static analysis; code obfuscation

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average