SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
WebVbasedhSecurityhAnalysishToolh 
forhAndroidhApplications 
ComputerhSciencehDepartmentPhMetropolitanhCollege 
NebiyuhFelekePhTandhyhSimanjuntakPhWenjiehShiPhYutinghZhangPhLouhChitkushevhh 
naberraPhtandhyPhwjshiPhdanazhPhltc@bu.edu 
Architecture 
OnNgoingIWork 
OurITool 
EveryhfifthhAndroidVbasedhdevicehwithhKasperskyhsolutionshwash 
attackedhbyhmalwarehduringhreportedhperiod 
OtherIWebNbasedIAnalysisITools 
Motivation 
www.idc.com 
www.kaspersky.com 
www.kaspersky.com 
Anubis 
AIwebIportalIofIandroidIapplicationsIsecurity 
ApplicationISecurityIAnalysisIbasedIonICategory 
ImplicitIOpenIomponentsIinIFinanceIandIMedicalIApplications 
PercentageIofITotalIOverIPrivilegeIApplicationsIbasedIonICategory 
ProposedIWork 
AIframeworkItoIanalyzeItheIsecurityIofIandroidIapplicationsIthroughIstaticIanalysis 
ProposeIandIimplementIaInumberIofImetricsIcomplementaryItoIthoseIinImanyIexistingIwebNbasedIanalysisItools: 
IdentifyIOverIPrivilege 
IdentifyIReNDelegation 
IdentifyIDangerousIPermissionsICombinationI 
IdentifyIOpenIComponents 
IdentifyIHiddenIFileIandICodeILoading 
IdentifyIRootIExploitIandIMaliciousIDomain 
AnalysishToolhPage 
SearchhToolhPage 
ApplicationISecurityIEvolutionIAnalysis 
IdentifyIandIclassifyIapplicationsIwithIsimilar 
functionalityIbasedIonIapplicationsEIdescriptionsIusingI 
keywordIanalysis 
InvestigateItheIassociationIbetweenIkeywordsIand 
otherIsecurityImetricsIsuchIasIpermissions 
PerformIbothIindividualIandIcollectiveIanalysis 
ReNdelegation 
OpenIComponents 
OverNprivilege 
DangerousIPermissionsICombination 
HiddenIFiles 
MaliciousIDomains 
RootIExploit 
CodeILoading 
TypesIofIMetricsIChangedI 
DistributionhofhAddedhVulnerabilities DistributionhofhDeletedhVulnerabilities 
ProposedIWork 
IdentifyImoreIsecurityImetricsIthatIcanIbe 
usedIforIevolutionIanalysis,IincludingIthose 
usedIinIotherIexistingItools 
InvestigateItheIpossibleIsecurityIevolution 
patternsIofIapplications 
InvestigateItheIpossibleIsecurityIpatternsIofI 
applicationsIwithIsimilarIfunctionality 
NumberIofITypesIofIMetricsIChangedI 
PercentageIofIDatasetI 
MetricsIinclude: 
DetailsIofIThreeIMetricsI 
TypeIofIMetricsI 
PercentageIofIDatasetI 
NumberIofIAddedIVulnerabilitiesI 
PercentageIofIApplicableIDatasetI 
PercentageIofIApplicableIDatasetI 
NumberIofIDeletedIVulnerabilitiesI 
TotalIDownloadedIApplicationsIbasedIonICategory 
IPercentageIofIRootIExploitIApplicationsIbasedIonICategory 
TotalINumberI 
Category 
TotalIPercentageI 
Category 
TotalIPercentageI 
Category 
InvestigateIpossibleIupdateIattacks, 
particularlyIthroughIanomalyIdetection

Más contenido relacionado

Similar a Web-based Security Analysis Tool for Android Applications

ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
Tunde Ogunkoya
 
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
Aditya K Sood
 
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
OWASP Russia
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
Jeremiah Grossman
 

Similar a Web-based Security Analysis Tool for Android Applications (20)

SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
SETTA'18 Keynote: Intelligent Software Engineering: Synergy between AI and So...
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010Hacker Halted Miami , USA 2010
Hacker Halted Miami , USA 2010
 
Quality in Cyber security Awareness
Quality in Cyber security AwarenessQuality in Cyber security Awareness
Quality in Cyber security Awareness
 
What are the top 10 web security risks?
What are the top 10 web security risks?What are the top 10 web security risks?
What are the top 10 web security risks?
 
Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®
Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®
Role of Generative AI in Strengthening Cybersecurity Measures | USCSI®
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
An overview of web security
An overview of web securityAn overview of web security
An overview of web security
 
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024GenAI talk for Young at Wageningen University & Research (WUR) March 2024
GenAI talk for Young at Wageningen University & Research (WUR) March 2024
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
 
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Sympathy for the Developer
Sympathy for the DeveloperSympathy for the Developer
Sympathy for the Developer
 
Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...Intelligent Software Engineering: Synergy between AI and Software Engineering...
Intelligent Software Engineering: Synergy between AI and Software Engineering...
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
 
Artificial Intelligence and Machine Learning by Praveen Hanchinal
Artificial Intelligence and Machine Learning by Praveen HanchinalArtificial Intelligence and Machine Learning by Praveen Hanchinal
Artificial Intelligence and Machine Learning by Praveen Hanchinal
 
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
RSA 2015 Blending the Automated and the Manual: Making Application Vulnerabil...
 
Web app penetration testing best methods tools used
Web app penetration testing best methods tools usedWeb app penetration testing best methods tools used
Web app penetration testing best methods tools used
 
Inside-Out-Newsletter 2020-21.pdf
Inside-Out-Newsletter 2020-21.pdfInside-Out-Newsletter 2020-21.pdf
Inside-Out-Newsletter 2020-21.pdf
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Web-based Security Analysis Tool for Android Applications

  • 1. WebVbasedhSecurityhAnalysishToolh forhAndroidhApplications ComputerhSciencehDepartmentPhMetropolitanhCollege NebiyuhFelekePhTandhyhSimanjuntakPhWenjiehShiPhYutinghZhangPhLouhChitkushevhh naberraPhtandhyPhwjshiPhdanazhPhltc@bu.edu Architecture OnNgoingIWork OurITool EveryhfifthhAndroidVbasedhdevicehwithhKasperskyhsolutionshwash attackedhbyhmalwarehduringhreportedhperiod OtherIWebNbasedIAnalysisITools Motivation www.idc.com www.kaspersky.com www.kaspersky.com Anubis AIwebIportalIofIandroidIapplicationsIsecurity ApplicationISecurityIAnalysisIbasedIonICategory ImplicitIOpenIomponentsIinIFinanceIandIMedicalIApplications PercentageIofITotalIOverIPrivilegeIApplicationsIbasedIonICategory ProposedIWork AIframeworkItoIanalyzeItheIsecurityIofIandroidIapplicationsIthroughIstaticIanalysis ProposeIandIimplementIaInumberIofImetricsIcomplementaryItoIthoseIinImanyIexistingIwebNbasedIanalysisItools: IdentifyIOverIPrivilege IdentifyIReNDelegation IdentifyIDangerousIPermissionsICombinationI IdentifyIOpenIComponents IdentifyIHiddenIFileIandICodeILoading IdentifyIRootIExploitIandIMaliciousIDomain AnalysishToolhPage SearchhToolhPage ApplicationISecurityIEvolutionIAnalysis IdentifyIandIclassifyIapplicationsIwithIsimilar functionalityIbasedIonIapplicationsEIdescriptionsIusingI keywordIanalysis InvestigateItheIassociationIbetweenIkeywordsIand otherIsecurityImetricsIsuchIasIpermissions PerformIbothIindividualIandIcollectiveIanalysis ReNdelegation OpenIComponents OverNprivilege DangerousIPermissionsICombination HiddenIFiles MaliciousIDomains RootIExploit CodeILoading TypesIofIMetricsIChangedI DistributionhofhAddedhVulnerabilities DistributionhofhDeletedhVulnerabilities ProposedIWork IdentifyImoreIsecurityImetricsIthatIcanIbe usedIforIevolutionIanalysis,IincludingIthose usedIinIotherIexistingItools InvestigateItheIpossibleIsecurityIevolution patternsIofIapplications InvestigateItheIpossibleIsecurityIpatternsIofI applicationsIwithIsimilarIfunctionality NumberIofITypesIofIMetricsIChangedI PercentageIofIDatasetI MetricsIinclude: DetailsIofIThreeIMetricsI TypeIofIMetricsI PercentageIofIDatasetI NumberIofIAddedIVulnerabilitiesI PercentageIofIApplicableIDatasetI PercentageIofIApplicableIDatasetI NumberIofIDeletedIVulnerabilitiesI TotalIDownloadedIApplicationsIbasedIonICategory IPercentageIofIRootIExploitIApplicationsIbasedIonICategory TotalINumberI Category TotalIPercentageI Category TotalIPercentageI Category InvestigateIpossibleIupdateIattacks, particularlyIthroughIanomalyIdetection