计算机科学
漏洞管理
假阳性悖论
脆弱性(计算)
Android(操作系统)
安全编码
计算机安全
应用程序安全性
攻击面
软件安全保证
水准点(测量)
脆弱性评估
信息安全
人工智能
操作系统
保安服务
心理学
大地测量学
心理弹性
心理治疗师
地理
作者
Sen Chen,Yuxin Zhang,Lingling Fan,Jiaming Li,Yang Liu
标识
DOI:10.1145/3551349.3559524
摘要
To reduce the attack surface from app source code, massive tools focus on detecting security vulnerabilities in Android apps. However, some obvious weaknesses have been highlighted in the previous studies. For example, (1) most of the available tools such as AndroBugs, MobSF, Qark, and Super use pattern-based methods to detect security vulnerabilities. Although they are effective in detecting some types of vulnerabilities, a large number of false positives would be introduced, which inevitably increases the patching overhead for app developers. (2) Similarly, static taint analysis tools such as FlowDroid and IccTA present hundreds of vulnerability candidates of data leakage instead of confirmed vulnerabilities. (3) Last but not least, a relatively complete vulnerability taxonomy is missing, which would introduce a lot of false negatives. In this paper, based on our prior knowledge in this research domain, we empirically propose a vulnerability taxonomy as the baseline and then extend AUSERA by augmenting the detection capability to 50 security vulnerability types. Meanwhile, a new benchmark dataset including all these 50 vulnerability types is constructed to demonstrate the effectiveness of AUSERA. The tool and datasets are available at https://github.com/tjusenchen/AUSERA and the demonstration video can be found at https://youtu.be/UCiGwVaFPpY.
科研通智能强力驱动
Strongly Powered by AbleSci AI