4.7 Article

Identifying Mobile Inter-App Communication Risks

Journal

IEEE TRANSACTIONS ON MOBILE COMPUTING
Volume 19, Issue 1, Pages 90-102

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TMC.2018.2889495

Keywords

Security; Malware; Feature extraction; Mobile computing; Sensitivity; Complexity theory; Standards; Android ICC; inter-app analysis; malware collusion; static analysis; risk assessment

Ask authors/readers for more resources

Malware collusion is a technique utilized by attackers to evade standard detection. It is a new threat where two or more applications, appearing benign, communicate to perform a malicious task. Most proposed approaches aim at detecting stand-alone malicious applications. We point out the need for analyzing data flows across multiple Android apps, a problem referred to as end-to-end flow analysis. In this work, we present a flow analysis for app pairs that computes the risk level associated with their potential communications. Our approach statically analyzes the sensitivity and context of each inter-app flow based on inter-component communication (ICC) between communicating apps, and defines fine-grained security policies for inter-app ICC risk classification. We perform an empirical study on 7,251 apps from the Google Play store to identify the apps that communicate with each other via ICC channels. Our results report four times fewer warnings on our dataset of 197 real app pairs communicating via explicit external ICCs than the state-of-the-art permission-based collusion detection.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Hardware & Architecture

Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE

Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol Fung, Moti Yung, Danfeng (Daphne) Yao

Summary: Using case studies and realistic scenarios, this analysis examines the security, privacy, and reliability of Google and Apple's COVID-19 exposure notification technology, validating the system and potentially increasing transparency.

COMPUTER (2022)

Article Computer Science, Software Engineering

Automatic Detection of Java Cryptographic API Misuses: Are We There Yet?

Ying Zhang, Md Mahir Asef Kabir, Ya Xiao, Danfeng Yao, Na Meng

Summary: This study investigates the misuse of cryptographic APIs on the Java platform and finds that developers face challenges in correctly using these APIs, leading to vulnerabilities in their software. Tools have been created to detect and fix these API misuses, but their design, effectiveness, and usefulness to developers are still unknown. The empirical study conducted in this research reveals that there is a significant gap between the current tools and developers' expectations.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2023)

Article Cardiac & Cardiovascular Systems

Assessment of causal associations between handgrip strength and cardiovascular diseases: A two sample mendelian randomization study

Chengui Zhuo, Jianqiang Zhao, Qiqi Wang, Zujin Lin, Haipeng Cai, Huili Pan, Lei Chen, Xiangyu Jin, Hong Jin, Longwei Xu, Xiyan Tao

Summary: The study found that handgrip strength is negatively associated with the risk of CAD, MI, and atrial fibrillation, but not with stroke, hypertension, or heart failure. This suggests that handgrip strength interventions may be explored as potential preventive measures for CVDs.

FRONTIERS IN CARDIOVASCULAR MEDICINE (2022)

Article Computer Science, Software Engineering

Demystifying Hidden Sensitive Operations in Android Apps

Xiaoyu Sun, Xiao Chen, Li Li, Haipeng Cai, John Grundy, Jordan Samhi, Tegawende Bissyande, Jacques Klein

Summary: Given the wide adoption of Android devices among consumers, security has become a key concern. Malware writers regularly update their attack mechanisms to hide malicious behavior, posing problems to current research techniques. This work proposes a static approach called HiSenDroid that specifically targets hidden sensitive operations, successfully revealing code aiming to evade detection by dynamic analysis. Experimental results show that certain hidden sensitive behaviors can lead to private data leaks. Overall, HiSenDroid helps security analysts validate potentially sensitive data operations that would have otherwise been unnoticed.

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2023)

Article Neurosciences

Association between electroconvulsive therapy and depressive disorder from 2012 to 2021: Bibliometric analysis and global trends

Haipeng Cai, Ruonan Du, Kebing Yang, Wei Li, Zhiren Wang

Summary: This study used bibliometric and visual analyses to map the current state of global research on electroconvulsive therapy (ECT) for depressive disorder, and to predict future research trends in this area.

FRONTIERS IN HUMAN NEUROSCIENCE (2022)

Article Computer Science, Information Systems

Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding

Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon

IEEE SECURITY & PRIVACY (2022)

Article Computer Science, Hardware & Architecture

From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C plus

Sazzadur Rahaman, Haipeng Cai, Omar Chowdhury, Danfeng Yao

Summary: Cryptographic program analysis (CPA) proposes using program analysis to detect implementation flaws in cryptographic protocols at compile time. The research found that many flaws in cryptographic implementations stem from violations of meta-level properties. A tool called TaintCrypt uses static taint analysis to identify these violations in C/C++ cryptographic implementations, showing promise in avoiding high-profile flaws and generating new security insights.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Software Engineering

Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection

Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj, Xiapu Luo, Haipeng Cai

Summary: Open science is highly beneficial for making scientific research accessible to everyone, and the software engineering community is advocating for open science policies. However, there have been few studies on the status and issues of open science in SE. This paper fills this gap by focusing on deep learning-based vulnerability detection and providing actionable recommendations for improving open science practices.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2023)

Article Biology

Spatiotemporal estimations of temperature rise during electroporation treatments using a deep neural network

Edward J. Jacobs IV, Sabrina N. Campelo, Kenneth N. Aycock, Danfeng Yao, Rafael Davalos

Summary: The nonthermal mechanism of irreversible electroporation is important for treating tumors and cardiac tissue in anatomically sensitive areas. A temperature prediction artificial intelligence (AI) model that uses estimated tissue properties, known geometric properties, and easily measurable treatment parameters has been developed. This model accurately predicts temperature rise in various conditions, including realistic simulations and ex vivo perfused porcine livers, with minimal error.

COMPUTERS IN BIOLOGY AND MEDICINE (2023)

Article Computer Science, Software Engineering

Do Pretrained Language Models Indeed Understand Software Engineering Tasks?

Yao Li, Tao Zhang, Xiapu Luo, Haipeng Cai, Sen Fang, Dawei Yuan

Summary: This article investigates the extent to which pre-trained language models understand software engineering tasks and discovers an overinterpretation phenomenon where the models confidently make decisions without salient features. The study explores strategies to mitigate this phenomenon and highlights the importance of designing input for AI4SE tasks.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2023)

Proceedings Paper Computer Science, Hardware & Architecture

Uncovering Vulnerabilities in Wasm Smart Contracts

Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu

Summary: WebAssembly (Wasm) smart contracts have gained popularity in the blockchain field, but they also face vulnerabilities. To address the limitations of existing methods, researchers have developed a new tool called WASAI, which can accurately detect vulnerabilities in Wasm smart contracts.

2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS (2023)

Article Behavioral Sciences

Suicidal Ideation and Electroconvulsive Therapy Outcomes in Adolescents With Major Depressive Disorder

Haipeng Cai, Ruonan Du, Jiaqi Song, Zhiren Wang, Xin Wang, Yongjun Yu, Yanan Wang, Lan Shang, Jianxin Zhang, Kebing Yang, Wei Li

Summary: This study investigated the efficacy and safety of electroconvulsive therapy (ECT) in improving suicidal ideation and depressive symptoms in adolescents with major depressive disorder. The findings showed that ECT treatment significantly improved suicidal ideation and depressive symptoms. Although there were transient impairments in some cognitive functions, they gradually recovered after ECT.

JOURNAL OF ECT (2023)

Article Computer Science, Software Engineering

D2ABS: A Framework for Dynamic Dependence Analysis of Distributed Programs

Haipeng Cai, Xiaoqin Fu

Summary: This paper presents the D(2)ABS framework for dynamic dependence analysis of distributed programs, offering a trade-off between efficiency and precision. By ordering events and utilizing message-passing semantics, the framework can compute method-level dependencies across different processes.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2022)

Proceedings Paper Computer Science, Information Systems

POLYCRUISE: A Cross-Language Dynamic Information Flow Analysis

Wen Li, Jiang Ming, Xiapu Luo, Haipeng Cai

Summary: Despite the limitations of existing program analysis techniques, POLYCRUISE enables holistic dynamic information flow analysis across multiple programming languages, thereby empowering security applications for multilingual software. The evaluation of POLYCRUISE demonstrates its practical scalability and promising capabilities in discovering cross-language security vulnerabilities.

PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM (2022)

Article Medicine, Research & Experimental

Subpopulation-specific machine learning prognosis for underrepresented patients with double prioritized bias correction

Sharmin Afrose, Wenjia Song, Charles B. Nemeroff, Chang Lu, Danfeng (Daphne) Yao

Summary: Many clinical datasets are imbalanced, leading to errors in machine learning models that prioritize majority groups. We propose a bias correction technique that trains customized models for underrepresented racial and age groups, reducing disparities and improving prediction accuracy.

COMMUNICATIONS MEDICINE (2022)

No Data Available