An Anti-Fuzzing Approach for Android Apps

dc.contributor.author Cheng, Chris Chao-Chun
dc.contributor.author Lin, Li
dc.contributor.author Shi, Chen
dc.contributor.author Guan, Yong
dc.contributor.department Electrical and Computer Engineering
dc.contributor.department Center for Statistics and Applications in Forensic Evidence
dc.date.accessioned 2023-11-10T14:24:41Z
dc.date.available 2023-11-10T14:24:41Z
dc.date.issued 2023-10-19
dc.description.abstract One of significant mobile app forensic analysis problems is the app evidence extraction from the device. Given the fact that mobile apps could generate more than 19K files in a device [6], simply manually inspecting every file is time consuming and may miss critical piece of evidence. A recent forensic analysis study [38] shows that fuzzing tools (a.k.a. fuzzer), which programmatically produce interactions with mobile apps, can be helpful when they are paired with sandbox environments for studying the app’s runtime forensic behaviors, by which forensic practitioners summarize the patterns of evidential data (such as GPS coordinates) that could greatly help with future forensic investigation. However, we found there is no study of how reliable do fuzzing tools help with improving the efficiency of mobile app forensic analysis.<br/> We, therefore, propose AFuzzShield, which aims at verifying the mobile app program coverage under the scenario when the app has the anti-fuzzing technologies applied. By analyzing the runtime information of mobile app interaction traces, it can prevent real-world apps from being exercised by fuzzers and minimizes the overhead of human usages. Our proposed approach exploits a statistical model to distinguish the difference between fuzzer and human patterns, and therefore it does not require graphical user interface (GUI) injections and is compatible with any real-world apps with touchable/clickable GUIs. We evaluate AFuzzShield on apps from AndroTest, a popular benchmark app dataset for testing various fuzzers, and the results demonstrate that, the mobile app program coverage can be significantly affected when it has anti-fuzzing technique, AFuzzShield, deployed, which results in missing mobile app evidential data patterns in the analysis (e.g. 70% of apps show promising results when having AFuzzShield applied under Monkey).
dc.description.comments This is a manuscript of a proceeding published as Cheng, C.CC., Lin, L., Shi, C., Guan, Y. (2023). An Anti-Fuzzing Approach for Android Apps. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XIX. DigitalForensics 2023. IFIP Advances in Information and Communication Technology, vol 687. Springer, Cham. https://doi.org/10.1007/978-3-031-42991-0_3. © 2023 IFIP International Federation for Information Processing. Posted with permission of CSAFE.
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/7vdXgRkv
dc.language.iso en
dc.publisher Springer Nature Switzerland AG 2023
dc.source.uri https://doi.org/10.1007/978-3-031-42991-0_3 *
dc.subject.disciplines DegreeDisciplines::Social and Behavioral Sciences::Legal Studies::Forensic Science and Technology
dc.subject.keywords Android app forensic analysis
dc.subject.keywords Android app anti-fuzzing
dc.subject.keywords digital forensics
dc.title An Anti-Fuzzing Approach for Android Apps
dc.type Presentation
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
relation.isOrgUnitOfPublication d8a3c72b-850f-40f6-87c4-8812547080c7
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
2023-Cheng-AntiRuzzingApproachManuscript.pdf
Size:
317.99 KB
Format:
Adobe Portable Document Format
Description: