计算机工程与应用 ›› 2018, Vol. 54 ›› Issue (4): 110-116.DOI: 10.3778/j.issn.1002-8331.1609-0195

• 网络、通信与安全 • 上一篇    下一篇

ParaIntentFuzz:安卓应用漏洞的并行化模糊测试方法

李  川1,刘宝旭2   

  1. 1.福州大学 数学与计算机科学学院,福州 350000
    2.中国科学院 信息工程研究所,北京 100093
  • 出版日期:2018-02-15 发布日期:2018-03-07

ParaIntentFuzz:Android applications parallel fuzzing system

LI Chuan1, LIU Baoxu2   

  1. 1.School of Mathematics and Computer Science, Fuzhou University, Fuzhou 350000, China
    2.Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Online:2018-02-15 Published:2018-03-07

摘要: 权限泄露是安卓应用中较为普遍存在的一类漏洞,可导致较为严重的安全问题,例如“串谋提权”等。通过Intent模糊测试技术发现暴露的组件,是挖掘权限泄露漏洞的有效方法。但是现有Intent模糊测试技术仅限于单机运行,效率低下。提出一种基于动态任务分配的并行模糊测试方法ParaIntentFuzz。该方法通过静态分析提取出安卓应用的extra信息并构造Intent命令,通过Drozer工具给目标应用发送命令,实现了独立的模糊测试,并部署到4台机器上。使用它分析了10 064个Android应用,最后发现有7 367个应用存在权限泄露的问题。

关键词: 权限泄露, 漏洞挖掘, 并行, Android

Abstract: Permission leakage is a common kind of vulnerability among Android applications. This kind of vulnerability can lead to serious security problem. Fuzzing the Intent to discover the expose of components and find the permission leakage from the exposed components is an efficient method to mine permission leakage. However, existing works based on Intent Fuzz to test this kind of vulnerability are only running on single machine, which leads to low availability. A parallel fuzzing system based on dynamic task distribution, named ParaIntentFuzz, is implemented. It first extracts extra information from application by static analysis and then constructs Intent commands. After sending commands to target application via Drozer, ParaIntentFuzz can effectively fuzz the target application. The system is deployed on four computers. With ParaIntentFuzz, it analyzes 10 064 Android applications and finds 7 367 of them having permission leakage problem.

Key words: permission leakage, vulnerability mining, parallel, Android