SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method

3Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Android usually employs the Secure Socket Layer (SSL) protocol to protect the user's privacy in network transmission. However, developers may misuse SSL-related APIs, which would lead attackers to steal user's privacy through man-in-the-middle attacks. Existing methods based on static decompiling technology to detect SSL security vulnerabilities of Android applications cannot cope with the increasingly common packed applications. Meanwhile, dynamic analysis approaches have the disadvantages of excessive resource consumption and time-consuming. In this paper, we propose a dynamic method to solve this issue based on our novel automatic traversal model. At first, we propose several new traversal strategies to optimize the widget tree according to the user interface (UI) types and the interface state similarity. Furthermore, we develop a more granular traversal model by refining the traversal level from the Activity component to the Widget and implement a heuristic depth-first traversal algorithm in combination with our customized traversal strategy. In addition, the man-in-the-middle agent plug-in is extended to implement real-time attack test and return the attack results. Based on the above ideas, we have implemented SSLDetecter, an efficient automated detection system of Android application SSL security vulnerability. We apply it on multiple devices in parallel to detect 2456 popular applications in several mainstream application markets and find that 424 applications are suffering from SSL security vulnerabilities. Compared with the existing system SMV-HUNTER, the time efficiency of our system increases by 38% and the average detection rate increases by 6.39 percentage points, with many types of SSL vulnerabilities detected.

References Powered by Scopus

Experimentation in software engineering

3691Citations
N/AReaders
Get full text

TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones

1014Citations
N/AReaders
Get full text

Why Eve and Mallory love Android: An analysis of Android SSL (in)security

423Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques

17Citations
N/AReaders
Get full text

Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications

5Citations
N/AReaders
Get full text

Cyber-physical healthcare security system based on a Raspberry Pi

3Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Tang, J., Li, J., Li, R., Han, H., Gu, X., & Xu, Z. (2019). SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method. Security and Communication Networks, 2019. https://doi.org/10.1155/2019/7193684

Readers over time

‘19‘20‘21‘22‘23‘24‘2502468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 6

86%

Lecturer / Post doc 1

14%

Readers' Discipline

Tooltip

Computer Science 8

80%

Engineering 1

10%

Psychology 1

10%

Save time finding and organizing research with Mendeley

Sign up for free
0