Do Android Taint Analysis Tools Keep their Promises?

04/09/2018
by   Felix Pauck, et al.
0

In recent years, researchers have developed a number of tools to conduct taint analysis of Android applications. While all the respective papers aim at providing a thorough empirical evaluation, comparability is hindered by varying or unclear evaluation targets. Sometimes, the apps used for evaluation are not precisely described. In other cases, authors use an established benchmark but cover it only partially. In yet other cases, the evaluations differ in terms of the data leaks searched for, or lack a ground truth to compare against. All those limitations make it impossible to truly compare the tools based on those published evaluations. We thus present ReproDroid, a framework allowing the accurate comparison of Android taint analysis tools. ReproDroid supports researchers in inferring the ground truth for data leaks in apps, in automatically applying tools to benchmarks, and in evaluating the obtained results. We use ReproDroid to comparatively evaluate on equal grounds the six prominent taint analysis tools Amandroid, DIALDroid, DidFail, DroidSafe, FlowDroid and IccTA. The results are largely positive although four tools violate some promises concerning features and accuracy. Finally, we contribute to the area of unbiased benchmarking with a new and improved version of the open test suite DroidBench.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/08/2022

TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs

Many Android apps analyzers rely, among other techniques, on dynamic ana...
research
03/12/2019

BenchPress: Analyzing Android App Vulnerability Benchmark Suites

In recent years, various efforts have designed and developed benchmark s...
research
02/13/2021

Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques

Mobile application security has been a major area of focus for security ...
research
12/07/2021

Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks

Several studies showed that misuses of cryptographic APIs are common in ...
research
11/10/2021

Towards Practical Evaluation of Android ICC Resolution Techniques

Inter-component communication (ICC) is a key mechanism in mobile apps, w...
research
12/11/2020

On the Generation of Disassembly Ground Truth and the Evaluation of Disassemblers

When a software transformation or software security task needs to analyz...
research
06/28/2020

A Survey on the Evaluation of Clone Detection Performance and Benchmarking

There are a great many clone detection tools proposed in the literature....

Please sign up or login with your details

Forgot password? Click here to reset