2021
DOI: 10.1145/3440033
|View full text |Cite
|
Sign up to set email alerts
|

Taming Reflection

Abstract: Android developers heavily use reflection in their apps for legitimate reasons. However, reflection is also significantly used for hiding malicious actions. Unfortunately, current state-of-the-art static analysis tools for Android are challenged by the presence of reflective calls, which they usually ignore. Thus, the results of their security analysis, e.g., for private data leaks, are incomplete, given the measures taken by malware writers to elude static detection. We propose a new instrumentation-based app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 70 publications
0
2
0
Order By: Relevance
“…Nevertheless, even for relection, our approach can still detect around one-third of HSOs. To better mitigate the impact of relection-based obfuscation on our approach, we further propose to strengthen the capability of HiSenDroid by integrating the state-of-the-art relection analysis tool DroidRA to handle relection usages [67]. After statically locating the relective calls, DroidRA can transform a relection-included Android app to a relection-free version, where the located relective calls will be represented by standard java calls.…”
Section: Impact Of Code Obfuscationmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, even for relection, our approach can still detect around one-third of HSOs. To better mitigate the impact of relection-based obfuscation on our approach, we further propose to strengthen the capability of HiSenDroid by integrating the state-of-the-art relection analysis tool DroidRA to handle relection usages [67]. After statically locating the relective calls, DroidRA can transform a relection-included Android app to a relection-free version, where the located relective calls will be represented by standard java calls.…”
Section: Impact Of Code Obfuscationmentioning
confidence: 99%
“…Therefore, we believe that the technical capabilities and our results would not be signiicantly impacted by code obfuscation. Nevertheless, as part of our future work, we plan to integrate other approaches developed by our fellow researchers to mitigate these long-standing challenges, e.g., by applying DroidRA [40,67] to mitigate the impact of relection-enhanced code obfuscations.…”
Section: Limitationsmentioning
confidence: 99%