Idea: Benchmarking Android Data Leak Detection Tools

Virtual application stores for mobile platforms contain many malign and benign applications that exhibit security issues, such as the leaking of sensitive data. In recent years, researchers have proposed a myriad of techniques and tools to detect such issues automatically. However, it is unclear how...

Full description

Saved in:
Bibliographic Details
Published inEngineering Secure Software and Systems Vol. 10953; pp. 116 - 123
Main Authors Corrodi, Claudio, Spring, Timo, Ghafari, Mohammad, Nierstrasz, Oscar
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2018
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3319944959
9783319944951
ISSN0302-9743
1611-3349
DOI10.1007/978-3-319-94496-8_9

Cover

Abstract Virtual application stores for mobile platforms contain many malign and benign applications that exhibit security issues, such as the leaking of sensitive data. In recent years, researchers have proposed a myriad of techniques and tools to detect such issues automatically. However, it is unclear how these approaches perform compared to each other. The tools are often no longer available, thus comparing different approaches is almost infeasible. In this work, we propose an approach to execute static analysis tools and collect their output to obtain unified reports in a common format. We review the current state-of-the-art in Android data leak detection tools, and from a list of 87 approaches, of which we were able to obtain and execute five. We compare these using a set of known vulnerabilities and discuss the overall performance of the tools. We further present an approach to compare security analysis tools by normalising their interfaces, which simplifies result reproduction and extension.
AbstractList Virtual application stores for mobile platforms contain many malign and benign applications that exhibit security issues, such as the leaking of sensitive data. In recent years, researchers have proposed a myriad of techniques and tools to detect such issues automatically. However, it is unclear how these approaches perform compared to each other. The tools are often no longer available, thus comparing different approaches is almost infeasible. In this work, we propose an approach to execute static analysis tools and collect their output to obtain unified reports in a common format. We review the current state-of-the-art in Android data leak detection tools, and from a list of 87 approaches, of which we were able to obtain and execute five. We compare these using a set of known vulnerabilities and discuss the overall performance of the tools. We further present an approach to compare security analysis tools by normalising their interfaces, which simplifies result reproduction and extension.
Author Ghafari, Mohammad
Corrodi, Claudio
Spring, Timo
Nierstrasz, Oscar
Author_xml – sequence: 1
  givenname: Claudio
  surname: Corrodi
  fullname: Corrodi, Claudio
  email: corrodi@inf.unibe.ch
– sequence: 2
  givenname: Timo
  surname: Spring
  fullname: Spring, Timo
– sequence: 3
  givenname: Mohammad
  surname: Ghafari
  fullname: Ghafari, Mohammad
– sequence: 4
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
BookMark eNpFkMtOwzAQRQ0URFr6BWzyAwaPx092peVRqRKbsracxKGlJQ5x-H_SFonVaObqjGbOmIya2ARCboHdAWP63mpDkSJYaoWwihpnz8gYh8Gx1-ckAwVAEYW9-A-kHZGMIePUaoFXZAxMcKYlAL8m05Q-GWOcoQWwGRHLKviH_DE05ebLd7tt85HPmqqL2ypf-N7nq-B3-SL0oey3scnXMe7TDbms_T6F6V-dkPfnp_X8la7eXpbz2Yq2XPCealMIXQghg0HQKqABXpsgS-1r6bUBxeu6AmErWUjGLfraoxdgUZRYFRInBE57U9sNh4XOFTHukgPmDoLcIMihG952RyFuEDQw4sS0Xfz-Cal34QCVoek7vy83vu1Dl5ziRigDDkA54Ap_AaMTZAg
ContentType Book Chapter
Copyright Springer International Publishing AG, part of Springer Nature 2018
Copyright_xml – notice: Springer International Publishing AG, part of Springer Nature 2018
DBID FFUUA
DEWEY 5.8
DOI 10.1007/978-3-319-94496-8_9
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 3319944967
9783319944968
EISSN 1611-3349
Editor Payer, Mathias
Such, Jose M
Rashid, Awais
Editor_xml – sequence: 1
  fullname: Payer, Mathias
– sequence: 2
  fullname: Such, Jose M
– sequence: 3
  fullname: Rashid, Awais
EndPage 123
ExternalDocumentID EBC6284681_116_126
GroupedDBID 0D6
0DA
38.
AABBV
ACOUV
AEDXK
AEJLV
AEKFX
AEZAY
ALMA_UNASSIGNED_HOLDINGS
ANXHU
BBABE
BICGV
BJAWL
BUBNW
CVGDX
CZZ
EDOXC
FFUUA
FOYMO
I4C
IEZ
NQNQZ
OEBZI
SBO
TPJZQ
TSXQS
Z7R
Z7S
Z7U
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z88
-DT
-~X
29L
2HA
2HV
ACGFS
ADCXD
EJD
F5P
LAS
LDH
P2P
RSU
~02
ID FETCH-LOGICAL-p242t-78b47b445e83176e3812f8e5c7af5a78162ffd149d5b50293afa3a41934c3db53
ISBN 3319944959
9783319944951
ISSN 0302-9743
IngestDate Tue Jul 29 20:11:05 EDT 2025
Thu May 29 00:54:50 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum QA76.9.A25
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p242t-78b47b445e83176e3812f8e5c7af5a78162ffd149d5b50293afa3a41934c3db53
OCLC 1042075112
PQID EBC6284681_116_126
PageCount 8
ParticipantIDs springer_books_10_1007_978_3_319_94496_8_9
proquest_ebookcentralchapters_6284681_116_126
PublicationCentury 2000
PublicationDate 2018
20180620
PublicationDateYYYYMMDD 2018-01-01
2018-06-20
PublicationDate_xml – year: 2018
  text: 2018
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesSubtitle Theoretical Computer Science and General Issues
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings
PublicationTitle Engineering Secure Software and Systems
PublicationYear 2018
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Hartmanis, Juris
Mattern, Friedemann
Goos, Gerhard
Steffen, Bernhard
Kittler, Josef
Weikum, Gerhard
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
– sequence: 13
  givenname: Gerhard
  surname: Goos
  fullname: Goos, Gerhard
– sequence: 14
  givenname: Juris
  surname: Hartmanis
  fullname: Hartmanis, Juris
SSID ssj0002039119
ssj0002792
Score 1.9124957
Snippet Virtual application stores for mobile platforms contain many malign and benign applications that exhibit security issues, such as the leaking of sensitive...
SourceID springer
proquest
SourceType Publisher
StartPage 116
SubjectTerms Android
Benchmarking
Data leak
Title Idea: Benchmarking Android Data Leak Detection Tools
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6284681&ppg=126
http://link.springer.com/10.1007/978-3-319-94496-8_9
Volume 10953
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagLMDCU5SXMjCBjJrYjh22ggpVBSwUxGbZiSMQ0CIahMSv5-w8mkQssESRlUb2fY19953vM0JHRqlYc22wH0YGU-3HWMPChqGVKsaIFtTWO9_chsN7Onpkj_OzOV11SaZP4-9f60r-gyq0Aa62SvYPyFYvhQa4B3zhCgjDteX8NmnWIp1fKQnmrLk5uYM59UsVGYG6Fnm5Xz0x7iiecxjE05tyNLnb0jh9TgD_TFm51ReYgzKTnyA-nk5fG8SAL1rEQEkMtqjFGrvVv2oEk4RYnWAImPzG7GgF6X6da-vbK2wplP1tiIWM5ktLmU73g5bctVtAB-cXIayOofAhDgklPLSIFrmgHbTUH4yuHyquLLAy9n5kS3PKPka5eNK8z5WiVC4a3OpSI35opbydJzFeQ6u2usSzZR_QyXW0YCYbaKWG5SaiFqYzrw6SV4DkWZA8C5JXgeQ5kLbQ_eVgfDHExeEW-B28ogxzoSnXlDIjwIULDXhOQSoMi7lKmeLCD4M0TSB-TZhmPXDKVKqIouBv05gkmpFt1JlMJ2YHeQnnjAmikl5MaMC1YgFNdNSL4OuMmEm7CJeDly4FX-z7jfOhzmQLhS46Li0k7eMzWWpbg2UlkWBZ6SwrwbK7f3z5Hlqe_1n3USf7-DQH4Ndl-rCA_QeSGEdH
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Engineering+Secure+Software+and+Systems&rft.atitle=Idea%3A+Benchmarking+Android+Data+Leak+Detection+Tools&rft.date=2018-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319944951&rft.volume=10953&rft_id=info:doi/10.1007%2F978-3-319-94496-8_9&rft.externalDBID=126&rft.externalDocID=EBC6284681_116_126
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6284681-l.jpg