VAnDroid2

VAnDroid2, as an extension of VAnDroid framework, is proposed to improve the detection of Inter-App Communication (IAC) security issues. VAnDroid2 focuses on ICC analysis to achieve three major goals: providing a comprehensive Intermediate Representation (IR) of the app, omitting the details that are not relevant to inter-app security analysis, and enabling more precise IAC security analysis. In this framework, two prominent inter-app vulnerabilities called Intent Spoofing and Unauthorized Intent are considered.

 

Tool

VAnDroid2 is developed as an Eclipse-based tool. All phases of the proposed approach are implemented as separate components so that each component provides the required input models for another component.

The tool and user manual are downloadable from this link.

 

Results of comparing VAnDroid2 with IC3

The output files of running VAnDroid2 and IC3 on two benchmarks, DroidBench and ICC-Bench, can be downloaded here.

 

Empirical Evaluation

We provided a dataset of real-world Android applications from different app repositories:

  • Benign: A set of 500 apps, available on the AndroZoo in late December 2019.
  • Malicious: A collection of 300 malicious apps, available on the AndroZoo in late December 2018.
  • Vulnerable: A collection of 257 vulnerable apps from four Android app vulnerability benchmarks, including DroidBench, ICCBench, Ghera, and UBCBench.

From this dataset, 10 bundles of apps, each containing 35 apps (29 benign apps, 3 malicious apps, and 3 vulnerable apps), are created randomly. The results of running VAnDroid2 on each bundle are downloadable from this link.

Leave a Reply

Your email address will not be published. Required fields are marked *