Blogs (1) >>
ASE 2019
Sun 10 - Fri 15 November 2019 San Diego, California, United States
Mon 11 Nov 2019 14:30 - 15:00 at Cortez 1B - SESSION II

In modern days, mobile applications (apps) have become omnipresent. Components of mobile apps (such as 3rd party libraries) require to be separated and analyzed differently for security issue detection, repackaged app detection, tumor code purification and so on. Various techniques are available to automatically analyze mobile apps. However, analysis of the app’s executable binary remains challenging due to required curated database, large codebases and obfuscation. Considering these, we focus on exploring a versatile technique to separate different components with designed based features independent of code obfuscation. Particularly, we conducted an empirical study using design patterns and fuzzy signatures to separate programming design components such as 3rd party libraries. In doing so, we have built a system for automatically extracting design patterns from both the executable package (APK) and Jar of an Android application. We have experimented the relationship and impact of design patterns in 3rd party libraries, usual apps and Android malware. The experimental outcome with various standard datasets containing obfuscated apps and malwares reveals that design features like these are present significantly within them (within 60% APKs including malware). Moreover, these features remain unaltered even after app obfuscation. Finally, as a case study, we have shown that the design patterns alone can detect 3rd party libraries within the obfuscated apps considerably (F1 score is 32%). Overall, our empirical study reveals that design features might play a versatile role in separating various Android components for various purposes.

Mon 11 Nov

Displayed time zone: Tijuana, Baja California change

14:00 - 15:30
SESSION IIA-Mobile at Cortez 1B
Automated Support for Testing and Maintenance of Mobile Applications
Mattia Fazzini University of Minnesota
Research paper
Automatic Components Separation of Obfuscated Android Applications: An Empirical Study of Design Based Features
Amit Kumar Mondal , Chanchal K. Roy University of Saskatchewan, Banani Roy University of Saskatchewan, Kevin Schneider University of Saskatchewan
Research paper
SeMA: A Design Methodology for Building Secure Android Apps
Joydeep Mitra Kansas State University, Venkatesh-Prasad Ranganath Kansas State University
Pre-print Media Attached