SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
WebVbasedhSecurityhAnalysishToolh 
forhAndroidhApplications 
ComputerhSciencehDepartmentPhMetropolitanhCollege 
NebiyuhFelekePhTandhyhSimanjuntakPhWenjiehShiPhYutinghZhangPhLouhChitkushevhh 
naberraPhtandhyPhwjshiPhdanazhPhltc@bu.edu 
Architecture 
OnNgoingIWork 
OurITool 
EveryhfifthhAndroidVbasedhdevicehwithhKasperskyhsolutionshwash 
attackedhbyhmalwarehduringhreportedhperiod 
OtherIWebNbasedIAnalysisITools 
Motivation 
www.idc.com 
www.kaspersky.com 
www.kaspersky.com 
Anubis 
AIwebIportalIofIandroidIapplicationsIsecurity 
ApplicationISecurityIAnalysisIbasedIonICategory 
ImplicitIOpenIomponentsIinIFinanceIandIMedicalIApplications 
PercentageIofITotalIOverIPrivilegeIApplicationsIbasedIonICategory 
ProposedIWork 
AIframeworkItoIanalyzeItheIsecurityIofIandroidIapplicationsIthroughIstaticIanalysis 
ProposeIandIimplementIaInumberIofImetricsIcomplementaryItoIthoseIinImanyIexistingIwebNbasedIanalysisItools: 
IdentifyIOverIPrivilege 
IdentifyIReNDelegation 
IdentifyIDangerousIPermissionsICombinationI 
IdentifyIOpenIComponents 
IdentifyIHiddenIFileIandICodeILoading 
IdentifyIRootIExploitIandIMaliciousIDomain 
AnalysishToolhPage 
SearchhToolhPage 
ApplicationISecurityIEvolutionIAnalysis 
IdentifyIandIclassifyIapplicationsIwithIsimilar 
functionalityIbasedIonIapplicationsEIdescriptionsIusingI 
keywordIanalysis 
InvestigateItheIassociationIbetweenIkeywordsIand 
otherIsecurityImetricsIsuchIasIpermissions 
PerformIbothIindividualIandIcollectiveIanalysis 
ReNdelegation 
OpenIComponents 
OverNprivilege 
DangerousIPermissionsICombination 
HiddenIFiles 
MaliciousIDomains 
RootIExploit 
CodeILoading 
TypesIofIMetricsIChangedI 
DistributionhofhAddedhVulnerabilities DistributionhofhDeletedhVulnerabilities 
ProposedIWork 
IdentifyImoreIsecurityImetricsIthatIcanIbe 
usedIforIevolutionIanalysis,IincludingIthose 
usedIinIotherIexistingItools 
InvestigateItheIpossibleIsecurityIevolution 
patternsIofIapplications 
InvestigateItheIpossibleIsecurityIpatternsIofI 
applicationsIwithIsimilarIfunctionality 
NumberIofITypesIofIMetricsIChangedI 
PercentageIofIDatasetI 
MetricsIinclude: 
DetailsIofIThreeIMetricsI 
TypeIofIMetricsI 
PercentageIofIDatasetI 
NumberIofIAddedIVulnerabilitiesI 
PercentageIofIApplicableIDatasetI 
PercentageIofIApplicableIDatasetI 
NumberIofIDeletedIVulnerabilitiesI 
TotalIDownloadedIApplicationsIbasedIonICategory 
IPercentageIofIRootIExploitIApplicationsIbasedIonICategory 
TotalINumberI 
Category 
TotalIPercentageI 
Category 
TotalIPercentageI 
Category 
InvestigateIpossibleIupdateIattacks, 
particularlyIthroughIanomalyIdetection

Weitere Àhnliche Inhalte

Ähnlich wie Web-based Security Analysis Tool for Android Applications

ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
Tunde Ogunkoya
 
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Aditya K Sood
 
[1.1] ĐŸĐŸŃ‡Đ”ĐŒŃƒ ĐČĐ°ĐŒ ŃŃ‚ĐŸĐžŃ‚ ĐżĐŸŃƒŃ‡Đ°ŃŃ‚ĐČĐŸĐČать ĐČ Đ¶ĐžĐ·ĐœĐž OWASP Russia - АлДĐșŃĐ°ĐœĐŽŃ€ ĐĐœŃ‚ŃƒŃ…
[1.1] ĐŸĐŸŃ‡Đ”ĐŒŃƒ ĐČĐ°ĐŒ ŃŃ‚ĐŸĐžŃ‚ ĐżĐŸŃƒŃ‡Đ°ŃŃ‚ĐČĐŸĐČать ĐČ Đ¶ĐžĐ·ĐœĐž OWASP Russia - АлДĐșŃĐ°ĐœĐŽŃ€ ĐĐœŃ‚ŃƒŃ…[1.1] ĐŸĐŸŃ‡Đ”ĐŒŃƒ ĐČĐ°ĐŒ ŃŃ‚ĐŸĐžŃ‚ ĐżĐŸŃƒŃ‡Đ°ŃŃ‚ĐČĐŸĐČать ĐČ Đ¶ĐžĐ·ĐœĐž OWASP Russia - АлДĐșŃĐ°ĐœĐŽŃ€ ĐĐœŃ‚ŃƒŃ…
[1.1] ĐŸĐŸŃ‡Đ”ĐŒŃƒ ĐČĐ°ĐŒ ŃŃ‚ĐŸĐžŃ‚ ĐżĐŸŃƒŃ‡Đ°ŃŃ‚ĐČĐŸĐČать ĐČ Đ¶ĐžĐ·ĐœĐž OWASP Russia - АлДĐșŃĐ°ĐœĐŽŃ€ ĐĐœŃ‚ŃƒŃ…
OWASP Russia
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
Jeremiah Grossman
 

Ähnlich wie Web-based Security Analysis Tool for Android Applications (20)

SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
 
Quality in Cyber security Awareness
Quality in Cyber security AwarenessQuality in Cyber security Awareness
Quality in Cyber security Awareness
 
What are the top 10 web security risks?
What are the top 10 web security risks?What are the top 10 web security risks?
What are the top 10 web security risks?
 
Role of Generative AI in Strengthening Cybersecurity Measures | USCSIÂź
Role of Generative AI in Strengthening Cybersecurity Measures | USCSIÂźRole of Generative AI in Strengthening Cybersecurity Measures | USCSIÂź
Role of Generative AI in Strengthening Cybersecurity Measures | USCSIÂź
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
An overview of web security
An overview of web securityAn overview of web security
An overview of web security
 
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
 
[1.1] ĐŸĐŸŃ‡Đ”ĐŒŃƒ ĐČĐ°ĐŒ ŃŃ‚ĐŸĐžŃ‚ ĐżĐŸŃƒŃ‡Đ°ŃŃ‚ĐČĐŸĐČать ĐČ Đ¶ĐžĐ·ĐœĐž OWASP Russia - АлДĐșŃĐ°ĐœĐŽŃ€ ĐĐœŃ‚ŃƒŃ…
[1.1] ĐŸĐŸŃ‡Đ”ĐŒŃƒ ĐČĐ°ĐŒ ŃŃ‚ĐŸĐžŃ‚ ĐżĐŸŃƒŃ‡Đ°ŃŃ‚ĐČĐŸĐČать ĐČ Đ¶ĐžĐ·ĐœĐž OWASP Russia - АлДĐșŃĐ°ĐœĐŽŃ€ ĐĐœŃ‚ŃƒŃ…[1.1] ĐŸĐŸŃ‡Đ”ĐŒŃƒ ĐČĐ°ĐŒ ŃŃ‚ĐŸĐžŃ‚ ĐżĐŸŃƒŃ‡Đ°ŃŃ‚ĐČĐŸĐČать ĐČ Đ¶ĐžĐ·ĐœĐž OWASP Russia - АлДĐșŃĐ°ĐœĐŽŃ€ ĐĐœŃ‚ŃƒŃ…
[1.1] ĐŸĐŸŃ‡Đ”ĐŒŃƒ ĐČĐ°ĐŒ ŃŃ‚ĐŸĐžŃ‚ ĐżĐŸŃƒŃ‡Đ°ŃŃ‚ĐČĐŸĐČать ĐČ Đ¶ĐžĐ·ĐœĐž OWASP Russia - АлДĐșŃĐ°ĐœĐŽŃ€ ĐĐœŃ‚ŃƒŃ…
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Sympathy for the Developer
Sympathy for the DeveloperSympathy for the Developer
Sympathy for the Developer
 
Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
 
Artificial Intelligence and Machine Learning by Praveen Hanchinal
Artificial Intelligence and Machine Learning by Praveen HanchinalArtificial Intelligence and Machine Learning by Praveen Hanchinal
Artificial Intelligence and Machine Learning by Praveen Hanchinal
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
Inside-Out-Newsletter 2020-21.pdf
Inside-Out-Newsletter 2020-21.pdfInside-Out-Newsletter 2020-21.pdf
Inside-Out-Newsletter 2020-21.pdf
 

KĂŒrzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

KĂŒrzlich hochgeladen (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Web-based Security Analysis Tool for Android Applications

  • 1. WebVbasedhSecurityhAnalysishToolh forhAndroidhApplications ComputerhSciencehDepartmentPhMetropolitanhCollege NebiyuhFelekePhTandhyhSimanjuntakPhWenjiehShiPhYutinghZhangPhLouhChitkushevhh naberraPhtandhyPhwjshiPhdanazhPhltc@bu.edu Architecture OnNgoingIWork OurITool EveryhfifthhAndroidVbasedhdevicehwithhKasperskyhsolutionshwash attackedhbyhmalwarehduringhreportedhperiod OtherIWebNbasedIAnalysisITools Motivation www.idc.com www.kaspersky.com www.kaspersky.com Anubis AIwebIportalIofIandroidIapplicationsIsecurity ApplicationISecurityIAnalysisIbasedIonICategory ImplicitIOpenIomponentsIinIFinanceIandIMedicalIApplications PercentageIofITotalIOverIPrivilegeIApplicationsIbasedIonICategory ProposedIWork AIframeworkItoIanalyzeItheIsecurityIofIandroidIapplicationsIthroughIstaticIanalysis ProposeIandIimplementIaInumberIofImetricsIcomplementaryItoIthoseIinImanyIexistingIwebNbasedIanalysisItools: IdentifyIOverIPrivilege IdentifyIReNDelegation IdentifyIDangerousIPermissionsICombinationI IdentifyIOpenIComponents IdentifyIHiddenIFileIandICodeILoading IdentifyIRootIExploitIandIMaliciousIDomain AnalysishToolhPage SearchhToolhPage ApplicationISecurityIEvolutionIAnalysis IdentifyIandIclassifyIapplicationsIwithIsimilar functionalityIbasedIonIapplicationsEIdescriptionsIusingI keywordIanalysis InvestigateItheIassociationIbetweenIkeywordsIand otherIsecurityImetricsIsuchIasIpermissions PerformIbothIindividualIandIcollectiveIanalysis ReNdelegation OpenIComponents OverNprivilege DangerousIPermissionsICombination HiddenIFiles MaliciousIDomains RootIExploit CodeILoading TypesIofIMetricsIChangedI DistributionhofhAddedhVulnerabilities DistributionhofhDeletedhVulnerabilities ProposedIWork IdentifyImoreIsecurityImetricsIthatIcanIbe usedIforIevolutionIanalysis,IincludingIthose usedIinIotherIexistingItools InvestigateItheIpossibleIsecurityIevolution patternsIofIapplications InvestigateItheIpossibleIsecurityIpatternsIofI applicationsIwithIsimilarIfunctionality NumberIofITypesIofIMetricsIChangedI PercentageIofIDatasetI MetricsIinclude: DetailsIofIThreeIMetricsI TypeIofIMetricsI PercentageIofIDatasetI NumberIofIAddedIVulnerabilitiesI PercentageIofIApplicableIDatasetI PercentageIofIApplicableIDatasetI NumberIofIDeletedIVulnerabilitiesI TotalIDownloadedIApplicationsIbasedIonICategory IPercentageIofIRootIExploitIApplicationsIbasedIonICategory TotalINumberI Category TotalIPercentageI Category TotalIPercentageI Category InvestigateIpossibleIupdateIattacks, particularlyIthroughIanomalyIdetection