Show simple item record

dc.contributor.advisorGu, Guofei
dc.creatorYan, Xu
dc.date.accessioned2015-09-21T18:16:14Z
dc.date.available2017-05-01T05:35:48Z
dc.date.created2015-05
dc.date.issued2015-05-05
dc.date.submittedMay 2015
dc.identifier.urihttps://hdl.handle.net/1969.1/155311
dc.description.abstractIn Android systems, inter-process communication relies heavily on intent, which can be understood as a message between apps. However, (i)intents can be hijacked when they are transmitted from senders to receivers. Even if received securely, due to developer's underestimation of intent data complexity, (ii)intents can cause exceptions in their receivers. An app is at the risk of losing response, and even crashing if it fails to handle the exceptions properly. To deal with the two potential problems above, we added an Android framework-layer module to reject the installation of suspicious apps that may hijack intents during transmission. In addition, we proposed and implemented FuzzingDroid, a utility tool that generates various relevant intents to fuzz test publicly-accessible intent receivers in apps. The tool is important because it helps developers detect the weakness of their incoming intent handling code before they release their apps. At its core, FuzzingDroid relies on our instrumented Android framework-layer module to generate the variant parts in fuzzing intents. The outcome of using FuzzingDroid is pretty good: after analyzing 47 highly-downloaded apps from Google Play Store, 46 highly-downloaded apps from other popular online app markets, 45 core system apps from LG Nexus 5 and 32 core system apps from XiaoMi phone respectively, we found 49 of the total 170 apps were crashed due to various intent handling deficiencies. FuzzingDroid is also a very efficient tool. It takes about 1 minute to fuzz an app completely with only 5% increase in CPU utilization and 24MB increase in memory utilization.en
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.subjectAndroiden
dc.subjectIntenten
dc.subjectFuzzing Testen
dc.titleWhere Does Your Intent Go and How It Behaves? A Robustness Study of Intent Reachability and Handling in Android Systemsen
dc.typeThesisen
thesis.degree.departmentComputer Science and Engineeringen
thesis.degree.disciplineComputer Scienceen
thesis.degree.grantorTexas A & M Universityen
thesis.degree.nameMaster of Scienceen
thesis.degree.levelMastersen
dc.contributor.committeeMemberChoe, Yoonsuck
dc.contributor.committeeMemberJi, Xiuquan
dc.type.materialtexten
dc.date.updated2015-09-21T18:16:14Z
local.embargo.terms2017-05-01
local.etdauthor.orcid0000-0002-2316-0512


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record