<div class="csl-bib-body">
<div class="csl-entry">Bleier, J., & Lindorfer, M. (2023). Of Ahead Time: Evaluating Disassembly of Android Apps Compiled to Binary OATs Through the ART. In J. Polakis & E. van der Kouwe (Eds.), <i>EUROSEC ’23: Proceedings of the 16th European Workshop on System Security</i> (pp. 21–29). https://doi.org/10.1145/3578357.3591219</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/190032
-
dc.description.abstract
The Android operating system has evolved significantly since its initial release in 2008. Most importantly, in a continuing effort to increase the run-time performance of mobile applications (apps) and to reduce resource requirements, the way code is executed has transformed from being bytecode-based to a binary-based approach: Apps are still mainly distributed as Dalvik bytecode, but the Android Runtime (ART) uses an optimizing compiler to create binary code ahead-of-time (AOT), just-in-time (JIT), or as a combination of both. These changes in the build pipeline, including increasing obfuscation and optimization of the Dalvik bytecode, invalidate assumptions of bytecode-based static code analysis approaches through identifier renaming and code shrinking. Furthermore, customized apps can be distributed pre-compiled with devices’ firmware, sidestepping the bytecode altogether. Finally, Android apps have always relied on native binary code libraries for performance-critical tasks. We propose to narrow the gap between bytecode and binary code by leveraging the ART compiler’s capability to create well-formed ELF binaries, called OATs, as the basis for further static code analysis. To this end, we created a pipeline to automatically and efficiently compile APKs to OATs into a benchmark dataset of 1,339 apps. We then evaluate five popular disassemblers based on how well they can analyze these OATs based on how well they can detect function boundaries. Our results, in particular, compared to the success rate of two bytecode-based analyzers, demonstrate that our OAT-based approach can help to bring a wider set of code analysis tools and techniques to the area of Android app analysis.
en
dc.description.sponsorship
WWTF Wiener Wissenschafts-, Forschu und Technologiefonds
-
dc.description.sponsorship
SBA Research gemeinnützige GmbH
-
dc.language.iso
en
-
dc.rights.uri
http://rightsstatements.org/vocab/InC/1.0/
-
dc.subject
Android Runtime
en
dc.subject
Bytecode vs Binary
en
dc.subject
Static analysis
en
dc.subject
Disassembly
en
dc.title
Of Ahead Time: Evaluating Disassembly of Android Apps Compiled to Binary OATs Through the ART
en
dc.type
Inproceedings
en
dc.type
Konferenzbeitrag
de
dc.rights.license
Urheberrechtsschutz
de
dc.rights.license
In Copyright
en
dc.contributor.editoraffiliation
University of Illinois at Chicago, United States of America (the)
-
dc.contributor.editoraffiliation
Vrije Universiteit Amsterdam
-
dc.relation.isbn
979-8-4007-0085-9
-
dc.description.startpage
21
-
dc.description.endpage
29
-
dc.relation.grantno
ICT19-056
-
dc.relation.grantno
COMET SBA-K1
-
dc.type.category
Full-Paper Contribution
-
tuw.booktitle
EUROSEC '23: Proceedings of the 16th European Workshop on System Security
-
tuw.project.title
IoTIO: Analyse des Internet der Unsicheren Dinge
-
tuw.project.title
Sicherheits- und Datenschutzgrundlagen von Blockchain-Technologien
-
tuw.researchTopic.id
I4
-
tuw.researchTopic.name
Information Systems Engineering
-
tuw.researchTopic.value
100
-
tuw.publication.orgunit
E192-06 - Forschungsbereich Security and Privacy
-
tuw.publisher.doi
10.1145/3578357.3591219
-
dc.identifier.libraryid
AC17203203
-
dc.description.numberOfPages
9
-
tuw.author.orcid
0009-0003-5927-7119
-
tuw.author.orcid
0000-0001-7001-4481
-
dc.rights.identifier
Urheberrechtsschutz
de
dc.rights.identifier
In Copyright
en
tuw.editor.orcid
0000-0001-5034-0730
-
tuw.editor.orcid
0000-0002-0312-9913
-
tuw.event.name
EUROSEC '23: European Workshop on System Security
en
tuw.event.startdate
08-05-2023
-
tuw.event.enddate
08-05-2023
-
tuw.event.online
On Site
-
tuw.event.type
Event for scientific audience
-
tuw.event.place
Rome
-
tuw.event.country
IT
-
tuw.event.presenter
Bleier, Jakob
-
tuw.event.track
Single Track
-
wb.sciencebranch
Informatik
-
wb.sciencebranch.oefos
1020
-
wb.sciencebranch.value
100
-
item.languageiso639-1
en
-
item.openairetype
conference paper
-
item.grantfulltext
mixedopen
-
item.fulltext
with Fulltext
-
item.cerifentitytype
Publications
-
item.mimetype
application/pdf
-
item.openairecristype
http://purl.org/coar/resource_type/c_5794
-
item.openaccessfulltext
Open Access
-
crisitem.author.dept
E192-06 - Forschungsbereich Security and Privacy
-
crisitem.author.dept
E192-06 - Forschungsbereich Security and Privacy
-
crisitem.author.orcid
0009-0003-5927-7119
-
crisitem.author.orcid
0000-0001-7001-4481
-
crisitem.author.parentorg
E192 - Institut für Logic and Computation
-
crisitem.author.parentorg
E192 - Institut für Logic and Computation
-
crisitem.project.funder
WWTF Wiener Wissenschafts-, Forschu und Technologiefonds