题名 | A Systematic Assessment on Android Third-party Library Detection Tools |
作者 | |
发表日期 | 2022
|
DOI | |
发表期刊 | |
ISSN | 0098-5589
|
EISSN | 1939-3520
|
卷号 | 48期号:11页码:4249-4273 |
摘要 | Third-party libraries (TPLs) have become a significant part of the Android ecosystem. Developers can employ various TPLs to facilitate their app development. Unfortunately, the popularity of TPLs also brings new security issues. For example, TPLs may carry malicious or vulnerable code, which can infect popular apps to pose threats to mobile users. Furthermore, TPL detection is essential for downstream tasks, such as vulnerabilities and malware detection. Thus, various tools have been developed to identify TPLs. However, no existing work has studied these TPL detection tools in detail, and different tools focus on different applications and techniques with performance differences. A comprehensive understanding of these tools will help us make better use of them. To this end, we conduct a comprehensive empirical study to fill the gap by evaluating and comparing all publicly available TPL detection tools based on six criteria: accuracy of TPL construction, effectiveness, efficiency, accuracy of version identification, resiliency to code obfuscation, and ease of use. Besides, we enhance these open-source tools by fixing their limitations, to improve their detection ability. Finally, we build an extensible framework that integrates all existing available TPL detection tools, providing an online service for the research community. We release the evaluation dataset and enhanced tools. According to our study, we also present the essential findings and discuss promising implications to the community; e.g., 1) Most existing TPL detection techniques more or less depend on package structure to construct in-app TPL candidates. However, using package structure as the module decoupling feature is error-prone. We hence suggest future researchers using the class dependency to substitute package structure. 2) Extracted features include richer semantic information (e.g., class dependencies) can achieve better resiliency to code obfuscation. 3) Existing tools usually have a low recall. Most existing tools cannot effectively find partial import TPLs, obfuscated TPLs, which directly limit their capability. 4) Existing tools are complementary to each other; we can build a better tool via combining the advantages of each tool. We believe our work provides a clear picture of existing TPL detection techniques and also gives a road-map for future research. |
关键词 | |
相关链接 | [Scopus记录] |
收录类别 | |
语种 | 英语
|
学校署名 | 其他
|
资助项目 | National Research Foundation, Singapore, through its the AI Singapore Programme[AISG2-RP-2020-019]
; National Research Foundation, Prime Ministers Office, Singapore[NRF2018NCR-NCR005-0001]
; NRF Investigatorship[NRFI06-2020-0022-0001]
; National Research Foundation through its National Satellite of Excellence in Trustworthy Software Systems (NSOE-TSS) Project under the National Cybersecurity RD (NCR)[NRF2018NCR-NSOE003-0001]
; Singapore National Research Foundation under NCR Award[NRF2018NCRNSOE004-0001]
; Australian Research Council (ARC)[
|
WOS研究方向 | Computer Science
; Engineering
|
WOS类目 | Computer Science, Software Engineering
; Engineering, Electrical & Electronic
|
WOS记录号 | WOS:000881981800002
|
出版者 | |
EI入藏号 | 20214111016716
|
EI主题词 | Android (Operating System)
; Codes (Symbols)
; Feature Extraction
; Libraries
; Mobile Security
; Open Source Software
; Semantics
|
EI分类号 | Computer Software, Data HAndling And Applications:723
; Data Processing And Image Processing:723.2
; Libraries:903.4.1
|
ESI学科分类 | COMPUTER SCIENCE
|
Scopus记录号 | 2-s2.0-85116929581
|
来源库 | Scopus
|
全文链接 | https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9551847 |
引用统计 |
被引频次[WOS]:6
|
成果类型 | 期刊论文 |
条目标识符 | http://sustech.caswiz.com/handle/2SGJ60CL/254288 |
专题 | 南方科技大学 工学院_计算机科学与工程系 |
作者单位 | 1.Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China, Hong Kong, (e-mail: csxzhan@comp.polyu.edu.hk) 2.Faculty of Information Technology, Monash University, 2541 Clayton, Victoria, Australia, (e-mail: tianming.liu@monash.edu) 3.Computer Science and Engineering, Southern University of Science and Technology, 255310 Shenzhen, Guangdong, China, 518052 (e-mail: liuyp1@sustech.edu.cn) 4.School of Computer Engineering, Nanyang Technological University, Singapore, Singapore, Singapore, 639798 (e-mail: yangliu@ntu.edu.sg) 5.Faculty of Information Technology, Monash University, 2541 Clayton, Victoria, Australia, 3168 (e-mail: li.li@monash.edu) 6.School of Computer Science, Beijing University of Posts and Telecommunications, 12472 Beijing, Beijing, China, (e-mail: haoyuwang@bupt.edu.cn) 7.Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong, Hong Kong, (e-mail: luoxiapu@gmail.com) |
推荐引用方式 GB/T 7714 |
Zhan,Xian,Liu,Tianming,Liu,Yepang,et al. A Systematic Assessment on Android Third-party Library Detection Tools[J]. IEEE Transactions on Software Engineering,2022,48(11):4249-4273.
|
APA |
Zhan,Xian.,Liu,Tianming.,Liu,Yepang.,Liu,Yang.,Li,Li.,...&Luo,Xiapu.(2022).A Systematic Assessment on Android Third-party Library Detection Tools.IEEE Transactions on Software Engineering,48(11),4249-4273.
|
MLA |
Zhan,Xian,et al."A Systematic Assessment on Android Third-party Library Detection Tools".IEEE Transactions on Software Engineering 48.11(2022):4249-4273.
|
条目包含的文件 | 条目无相关文件。 |
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论