Werner Dietl
wdietl@uwaterloo.ca, Room EIT 4007
Static analysis of implicit control flow: Resolving Java reflection and Android intents
Download: PDF, extended version, SPARTA toolset, Checker Framework.
“Static analysis of implicit control flow: Resolving Java reflection and Android intents” by P. Barros, R. Just, S. Millstein, P. Vines, W. Dietl, M. d'Amorim, and M. D. Ernst. In Automated Software Engineering (ASE), Nov. 2015, pp. 669-679.
Abstract
Implicit or indirect control flow is a transfer of control between procedures using some mechanism other than an explicit procedure call. Implicit control flow is a staple design pattern that adds flexibility to system design. However, it is challenging for a static analysis to compute or verify properties about a system that uses implicit control flow.
This paper presents static analyses for two types of implicit control flow that frequently appear in Android apps: Java reflection and Android intents. Our analyses help to resolve where control flows and what data is passed. This information improves the precision of downstream analyses, which no longer need to make conservative assumptions about implicit control flow.
We have implemented our techniques for Java. We enhanced an existing security analysis with a more precise treatment of reflection and intents. In a case study involving ten real-world Android apps that use both intents and reflection, the precision of the security analysis was increased on average by two orders of magnitude. The precision of two other downstream analyses was also improved.
Download: PDF, extended version, SPARTA toolset, Checker Framework.
BibTeX entry:
@inproceedings{implicit-control-flow-ase2015, author = {P. Barros and R. Just and S. Millstein and P. Vines and W. Dietl and M. d'Amorim and M. D. Ernst}, booktitle = {Automated Software Engineering (ASE)}, month = nov, }
Copyright notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
(This webpage was created with bibtex2web.)