SO{U}RCERER : Developer-Driven Security Testing Framework for Android Apps
Frequently advised secure development recommendations often fall short in practice for app developers. Tool-driven (e.g., using static analysis tools) approaches lack context and domain-specific requirements of an app being tested. App developers struggle to find an actionable and prioritized list of vulnerabilities from a laundry list of security warnings reported by static analysis tools. Process-driven (e.g., applying threat modeling methods) approaches require substantial resources (e.g., security testing team, budget) and security expertise, which small to medium-scale app dev teams could barely afford. To help app developers secure their apps, we propose SO{U}RCERER, a guiding framework for Android app developers for security testing. SO{U}RCERER guides developers to identify domain-specific assets of an app, detect and prioritize vulnerabilities, and mitigate those vulnerabilities based on secure development guidelines. We evaluated SO{U}RCERER with a case study on analyzing and testing 36 Android mobile money apps. We found that by following activities guided by SO{U}RCERER, an app developer could get a concise and actionable list of vulnerabilities (24-61% fewer security warnings produced by SO{U}RCERER than a standalone static analyzer), directly affecting a mobile money app’s critical assets, and devise a mitigation plan. Our findings from this preliminary study indicate a viable approach to Android app security testing without being overwhelmingly complex for app developers.
Mon 15 NovDisplayed time zone: Hobart change
08:00 - 12:15 | |||
08:00 10mDay opening | Opening [Workshop] A-Mobile | ||
08:10 60mKeynote | Automated Repair of Size-based Inaccessibility Issues in Mobile Applications - William G. J. Halfond [Workshop] A-Mobile | ||
09:10 20mPaper | Android Malware Detection: Looking beyond Dalvik Bytecode [Workshop] A-Mobile Tiezhu Sun , Nadia Daoudi University of Luxembourg, Kevin Allix University of Luxembourg, Tegawendé F. Bissyandé SnT, University of Luxembourg | ||
09:30 20mPaper | SO{U}RCERER : Developer-Driven Security Testing Framework for Android Apps [Workshop] A-Mobile Muhammad Sajidur Rahman University of Florida, USA, Blas Kojusner University of Florida, USA, Ryon Kennedy University of Florida, USA, Prerit Pathak University of Florida, USA, Lin Qi University of Florida, USA, Byron Williams Pre-print | ||
09:50 20mPaper | Accelerating Symbolic Analysis for Android Apps [Workshop] A-Mobile Mingyue Yang University of Toronto, Canada, David Lie University of Toronto, Canada, Nicolas Papernot University of Toronto, Canada | ||
10:10 20mBreak | Break [Workshop] A-Mobile | ||
10:30 60mKeynote | Towards Advancing Non-functional Testing of Mobile Apps - Reyhaneh Jabbarvand [Workshop] A-Mobile Reyhaneh Jabbarvand University of Illinois, Urbana-Champain | ||
11:30 20mPaper | A First Step Towards Detecting Values-violating Defects in Android APIs [Workshop] A-Mobile Conghui Li Monash University, Humphrey Obie Monash University, Hourieh Khalajzadeh Monash University, Australia | ||
11:50 20mPaper | A First Look at Security Risks of Android TV Apps [Workshop] A-Mobile Yonghui Liu , Li Li Monash University, Pingfan Kong University of Luxembourg, Luxembourg, Xiaoyu Sun , Tegawendé F. Bissyandé SnT, University of Luxembourg | ||
12:10 5mDay closing | Closing [Workshop] A-Mobile |