• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    CM-Droid: Secure Container for Android Password Misuse Vulnerability

    2019-04-29 03:21:32WenZhangKeyueLiTianyangLiShaozhangNiuandZhenguangGao
    Computers Materials&Continua 2019年4期

    Wen Zhang, Keyue Li, , Tianyang Li, Shaozhang Niu and Zhenguang Gao

    Abstract: Android applications are associated with a large amount of sensitive data,therefore application developers use encryption algorithms to provide user data encryption, authentication and data integrity protection. However, application developers do not have the knowledge of cryptography, thus the cryptographic algorithm may not be used correctly. As a result, security vulnerabilities are generated. Based on the previous studies, this paper summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability. And on this basis, this paper designs and implements a secure container for Android application software password misuse vulnerability: CM-Droid.

    Keywords: Password misuse, evaluation model, secure container, dynamic repair.

    1 Introduction

    With the development of mobile Internet and the popularity of smart phones, smart phones have become an indispensable part of most people’s lives. According to the smart phone system share report released by market research organization Gartner [Wang(2017)], in the first quarter of 2017, the sales of Android devices reached 327 million units, and the corresponding Android system share reached 86.1%, an increase of 2%over the same period last year. Since the number of applications in the Google Play app store exceeded 1 million in 2015, it has maintained a rapid growth trend. By January 2017, the number of applications has increased to 2.7 million.

    In order to provide users with more software features, the Android system provides developers with interfaces such as reading geographic information, contact lists and other private data. In addition, users often need to input personal information such as account number and password in the process of using application software, which causes Android applications associating a large amount of user sensitive data. Developers use encryption algorithms to provide data encryption, authentication and integrity protection in applications. However, in the analysis report of Veracode [Danhieux (2016)] in 2015,87% of Android applications have encryption problems, which is 36% higher than the 51% in 2013. In the 2016 Annual Report published by Aliju Security, the Top10 Android application software of 18 industries in 2016 was analyzed. Among the 14798 bugs detected, 3174 (21.4%) were password misuse loopholes. This shows the phenomenon of password misuse is very common in Android applications.

    This paper summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability. And on this basis, this paper designs and implements a secure container for Android application software password misuse vulnerability: CM-Droid. The container is able to quickly locate password misuse vulnerabilities in Android apps and fixes vulnerabilities through flexible security policies.

    2 Previous work

    In the early stages, the research on password misuse vulnerability of Android platform is mainly concentrated in the direction of SSL/TLS protocol. In 2008, Bhargavan et al.[Bhargavan, Fournet, Corin et al. (2008)] showed how to use detection tools to analyze the security of the use process of cryptographic protocols. In 2012, Georgiev et al.[Georgiev, Iyengar, Jana et al. (2012)] used a man-in-the-middle attack to detect whether an SSL security vulnerability exists in the application. In 2014, Sounthiraraj and others[Sounthiraraj, Sahs, Greenwood et al. (2014)] proposed the SMV-HUNTER system,which could automatically identifies SSL/TLS man-in-the-middle attacks vulnerability for large-scale Android applications. In 2015, Onwuzurike [Onwuzurike and De Cristofaro (2015)] conducted research on information leakage and SSL vulnerabilities in Android applications. However, the above work only studies the password misuse problem of the protocol, and does not systematically detect the password misuse vulnerability existing in the entire application software. In 2013, Egele et al. [Egele,Brumley, Fratantonio et al. (2013)] systematically analyzed the password misuse vulnerability of Android applications. In 2014, Shao et al. [Shao, Dong, Guo et al. (2014)]established a password misuse detection system CMA, which uses a combination of dynamic and static methods to detect password misuse vulnerability in Android programs.In 2015, Chatzikonstantinou et al. [Chatzikonstantinou, Ntantogian and Karopoulos(2015)] chose to use weak encryption, weak implementation, weak key and weak encryption parameters as detection items to detect Android application password misuse vulnerability. In 2018, Li et al. [Li, Luo, Zhao et al. (2018)] proposed a provably secure APK redevelopment authorization scheme in the standard model.

    In addition, González et al. [González, Esparza, Mu?oz et al. (2015)] analyzed the encryption algorithms and encryption structures provided by Android in the research.They found that the encryption algorithms provided were not the same in multiple system versions of Android. Somak et al. [Somak, Gopal, King et al. (2014)] studied encryption libraries including programming languages such as C, C++, Java, Python and Go.However, the above research only detects whether the application has a password misuse security problem, and cannot fix the existing vulnerability in the program. Ma et al. [Ma,Lo, Li et al. (2016)] implemented an automatic repair tool CDRep for Android application password misuse vulnerability. But there are two problems with this scheme: 1. Only use static detection to detect password misuse vulnerabilities in the application, so there may be a false positive. 2. The re-packaging method is used to complete the bug fix. This method cannot be applied to the application software with anti-repackaging function. It can be seen that there is still a significant gap in the security protection research for Android application password misuse vulnerability, which is also the focus of this paper.

    3 Android application password misuse vulnerability analysis

    3.1 Analysis of the current situation of Android software password usage

    We downloaded Top30 applications in the five categories of wealth management,communication, music, entertainment, and reading from the Yingyongbao app store, and then analyzed the use of encryption algorithms for these applications. The analysis results are shown in Tab. 1. Through analysis of these 30 APPs, we found that the category with the highest ratio of using encryption algorithms is the reading class, which has achieved 57% usage. In addition, most applications that use encryption algorithms use three types of encryption algorithms at the same time. There are few applications that use only one or two types of algorithms. This illustrates the need to detect password misuse vulnerabilities in Android apps from multiple dimensions.

    Table 1: Statistics table of the usage of encryption algorithm in various applications

    3.2 Android password misuse vulnerability risk rating

    3.2.1 Quantitative analysis of the risks

    For the classification of application software password misuse, CWE [CWE (2018)] lists more than 20 security vulnerabilities that developers need to pay attention to during the application development process, but the CWE classification is not specifically analyzed for the Android platform. Based on the CWE classification, we also refer to the method of Shuai [Shao, Dong, Guo et al. (2014)], and divide the password misuse vulnerability of Android application software into four categories: symmetric encryption algorithm class,asymmetric encryption algorithm class, hash algorithm class and password management class. We quantify the security impact of these vulnerabilities. For the convenience of explanation, in the following analysis process, We use m, n for the length of the encryption key, l for the output length of the hash function, and k for the constant,and there are m, n, l, k∈N, m

    Symmetric encryption algorithm (SE):symmetric encryption algorithms provided by the Android platform include DES, AES, etc. Symmetric encryption algorithm class vulnerabilities include three subclasses: encryption mode misuse, initial vector misuse,and encryption algorithm misuse.

    Asymmetric Encryption Algorithm (ASE):The asymmetric encryption algo-rithm provided by the Android platform is mainly the RSA algorithm. The vulnerabilities of asymmetric encryption algorithms include four subclasses: key length misuse, low decryption index misuse, padding mode misuse, and certificate validation vulnerabilities.

    Hash Algorithm (HA):The hash algorithm is a one-way algorithm. The user can generate a unique hash value of a specific length by using a hash algorithm. Hash algorithm class vulnerabilities include two subclasses: cryptographic algorithm misuse and input parameter misuse. Tab. 4 lists the quantitative analysis of vulnerabilities.

    Key Management (KM):A key management class vulnerability is when an application software stores or passes an encryption key in an unsecure manner. Key management class vulnerabilities mainly include key storage vulnerabilities and key generation vulnerabilities.

    3.2.2 Threat rating

    According to the research results, the attack complexity of the encryption algorithm can be divided into five categories: constant order, linear order, polynomial order, subexponential order, and exponential order according to the order of magnitude. This article uses M (magnitude) to represent the order of magnitude of complexity: M1 represents a constant order and the attack complexity belonging to M1 is O(1); M2 represents a linear order and the attack complexity belonging to M2 is O(n); M3 represents a polynomial order, and the attack complexity belonging to M3 is O(p(n)); M4 represents the subexponential order, and the attack complexity belonging to M4 is O(L(n)); M5 represents the exponential order, and the attack complexity belonging to M5 is O(2n/2) and O(2n).We classify the security threat level of password misuse vulnerability into three levels,namely high risk, medium risk and low risk. The criteria for judging are shown in Tab. 2.

    Table 2: Security threat level standard

    At low-risk levels, the complexity of the vulnerability is of the same order of magnitude,or is reduced from an exponential step to a sub-exponential order. Attackers use the vulnerability to gain less benefit, and the attack process still requires complex calculations or takes a long time, so such vulnerabilities are relatively less threatening to the application.

    At the medium-risk level, the attack complexity after exploiting the vulnerability is a polynomial order. The use of such vulnerabilities can significantly reduce the amount of attackers’ calculations, and may even cause attacks that previously took several months to complete in a relatively short and acceptable time, so such vulnerabilities pose a significant hazard to the application.

    At high risk levels, the attack complexity after exploiting the vulnerability is reduced to a linear order or a constant order. That is, the algorithm itself is very secure, but after the vulnerability occurs, the attacker can use the external factors in the algorithm to complete the attack very easily. Such vulnerability seriously affects the security of the application.Based on the above definition of security threat levels for password misuse vulnerabilities,we rated and summarized the security risks of various types of password misuse vulnerabilities. The specific rating results are shown in Tab. 3.

    Table 3: Password misuse security threat rating

    3.3 Android password misuse vulnerability repair model

    3.3.1 Password misuse causes

    According to the principle of password misuse vulnerability, we summarize the reasons for the password misuse vulnerability in the development process. We abstract three main causes, algorithm selection errors, algorithm parameter setting errors, and password usage process errors, as described below:

    R1, the algorithm selection is wrong. It mainly means that when using the cryptographic algorithm, the developer selects a cryptographic algorithm that has been proven to be unsafe.

    R2, the algorithm parameter setting is wrong. It mainly means that when the password algorithm is used by the developer, the wrong password parameter is set or the password parameter is generated in an unsafe manner.

    R3, the key usage process is wrong. It mainly means that when the cryptographic algorithm is used by the developer, there are obvious problems in the process of generating, storing, and transmitting the key, which causes the attacker to obtain the key under a very low attack condition.

    3.3.2 Repair strategy

    This article divides the application data into two categories according to the scope of the encrypted data, namely local data (L) and shared data (S). Local data refers to data stored only in the local sandbox or external storage area and used only within the application,which support the local business needs of the application software, but will not leave the scope covered by the application software. Shared data refers to data that is shared with external systems by applications such as inter-process communication, file sharing, and network communication. According to the cause of the Android password misuse vulnerability and the data type of the application software, this paper proposes five repair strategies: parameter fix, storage fix, key fix, block fix, and warning fix.

    Parameter Fix (PF):When there are R1 and R2 password misuse holes in the encryption and decryption process, the vulnerability is replaced by replacing the calling parameters of the encryption API to avoid security risks. Since the repair strategy modifies key factors such as encryption algorithms and algorithm parameters in the data encryption process, it will affect the decryption process of the data. This policy can only fix password misuse holes in local data when it is executed independently.

    Storage Fix (SF):When there is a password misuse vulnerability of the R3 class key storage problem during the encryption and decryption process, the vulnerability is repaired by modifying the storage path of the data to avoid security risks. This fix policy fixes the vulnerability mainly by changing the access rights of the local key file, so it only applies to the password misuse vulnerability of local data.

    Key Fix (KF):When there is a password misuse vulnerability of the R3 class key generation problem during the encryption and decryption process, the vulnerability repair is completed by modifying the key generation method to avoid the occurrence of security risks.

    Block Fix (BF):When there is a high-risk password misuse vulnerability in the encryption and decryption process, the vulnerability is fixed by forcibly blocking the encryption and decryption process of the data to avoid the occurrence of security risks.This repair strategy can be applied to password misuse vulnerabilities of local data and shared data, but it will affect the data execution logic of the application software, thus requiring user authorization and licensing.

    Warning Fix (WF):When there is a password misuse vulnerability in the encryption and decryption process, by prompting the user to risk, the user actively chooses to stop the business logic to fix the vulnerability and avoid the occurrence of security risks. This repair strategy can also be applied to password misuse vulnerabilities of local data and shared data, but does not hinder the original business logic throughout the process.

    3.3.3 CFMM model

    CMFM adopts three repair strategies: parameter fix, storage fix and key fix. It will securely repair the encryption algorithm, encryption mode, encryption parameters, stored procedure, and key generation process used in the encryption and decryption process.CMFM abstracts the repair strategy of each vulnerability by repairing the vector-based four-dimensional tuple, including vulnerability number, vulnerability cause, encrypted data type, and repair strategy. Among them, each dimension element represents the key elements in the process of policy instantiation, as shown in Fig. 1.

    Figure 1: Four repair strategies

    Therefore, the repair of the password misuse vulnerability through CMFM can make the encryption and decryption process in the application have no vulnerability of constant order and linear order attack complexity, effectively avoid the security risk introduced by the password misuse vulnerability, and greatly improve the security of data in the application.

    4 Design of CM-Droid

    Based on the repair model set in the previous chapter, this chapter proposes a secure container based on the application layer: CM-Droid. The container performs real-time monitoring on the execution process of the Android application invoking the encryption library, and through the flexible reinforcement policy configuration, the password misuse vulnerability of the application software is repaired to prevent the attacker from exploiting the password misuse vulnerability and prevent implementing key extraction,man-in-the-middle attacks, and encrypted data cracking of application software.

    4.1 System architecture

    The system architecture of CM-Droid consists of two parts, the server and the client. The server is responsible for analyzing the static code of the application and completing the generation, storage and management of the policy; the client is the main body of the CMDroid, which implements the secure running environment of the application, and is responsible for monitoring the encryption API and The repair of the vulnerability. The system architecture of CM-Droid is shown in Fig. 2.

    Figure 2: The system architecture of CM-Droid

    PGS: PGS (Policy Generation Server) is the first module to be executed to prepare for the dynamic execution of the client. The PGS module first performs static code analysis on the APP uploaded by the client, including basic feature analysis, deep feature analysis,and vulnerability extraction.

    SRE: SRE (Safe Runtime Environment) is the basic building block of the entire container,simulating the operating environment of the system to ensure that the application runs in a safe environment.

    PEP: PEP (Policy Enforcement Point) is responsible for monitoring the behavior of the application runtime, confirming the suspected vulnerability, and repairing the encryption and decryption process of the confirmed vulnerability in real time.

    After receiving the result returned by the PDP, the PEP will perform the corresponding operation according to the detection result. The PEP will complete the hardening according to the repair policy returned by the PDP.

    PDP: The main role of the PDP (Policy Decision Point) is to perform security diagnosis on the current operation.

    4.2 Key processes

    4.2.1 Strategy generation

    Policy generation is performed on the PGS (Policy Generation Server) remote server. It mainly analyzes the application and generates CMRS files. CMRS is used for Section 4.3 dynamic validation and Section 4.4 bug fixes.

    The strategy generation mainly includes the following four stages, basic feature extraction, depth feature analysis, dynamic analysis preprocessing and policy generation,as shown in Fig. 3.

    Figure 3: Strategy generation

    Basic feature extraction:In PGS, we analyze the decompiled intermediate files by using the basic parsing of the APK file and combining Androguard to obtain the basic features of the application software.

    Depth feature preprocessing information:In addition to the basic information of Apk,key API information, we also need to extract the information needed for deep feature analysis.

    Depth feature analysis:Based on the basic features, we obtained some infor-mation,such as SE-AM. According to the code fragment const-string/jumbo v2, we can know that some insecure DES algorithm is used in the code. But it can't be linked to the vulnerability fix point we need: Ljava/crypto/Cipher;-> getInstance (encryption algorithm,working mode, filling method). We need to perform control flow analysis on the code,creating a path from the code fragment const-string/jumbo v2 to the bug fix point Ljava/crypto/Cipher;-> getInstance(). And record the vulnerability fix point.

    After basic feature extraction and depth feature analysis, we combine the collected code features with the definition of the vulnerability to generate a validation vulnerability set,confirming that the vulnerability set contains the vulnerability name, description, fix point features, and fix point location.

    Dynamic Analysis Preprocessing:Some vulnerabilities we cannot or are difficult to confirm with static analysis. For example, key length misuse (SE-KLM), the repair point feature is, Ljavax/crypto/KeyGenerator; -> initialize(I)V. The basic data type in the code is difficult to get the actual value, and the actual value of the parameter can only be obtained when the application is running.

    Strategy generation:In the third chapter, we have detailed descriptions of the vulnerability repair strategy, and we will not make a detailed statement here. Based on the name of the vulnerability, we generate the corresponding repair strategy and finally generate a CMRS file.

    4.2.2 Dynamic confirmation

    The dynamic confirmation of the suspected vulnerability of CM-Droid mainly involves vulnerabilities in the dynamic execution of suspected vulnerabilities in the policy file to determine whether the vulnerability exists. Participants in the entire process include the remote PGS and the local CM-Droid container. The dynamic confirmation process for suspected vulnerabilities is shown in Fig. 4.

    Figure 4: Dynamic confirmation

    Install phase:After the application is installed into the container, the PDP module will first extract the basic information of the application: Apk_name, Apk_Version, Apk_Size.Communicate with the PGS to obtain the CMRS file of the application from the PGS.PGS first looks for basic information based on the application. If the remote library contains eligible CMRS, it will return this CMRS directly. If the Apk does not exist in the PGS remote library, the Apk is transmitted remotely, and the policy generation process is executed.

    Launch phase:After the application is launched, when it is executed to the key API, it will be intercepted by the PEP module. The PEP module will collect the feature package of the Apk at this time: the API of the hook, the API parameters, and the stack information. The feature is sent to the PDP module, and the PDP module determines the vulnerability.

    Verification method:In CM-Droid, the dynamically confirmed vulnerabilities include ASE-CVV, ASE-LDEM, HA-IM, KM-KSV, etc. These vulnerabilities generate conditions during the policy generation phase, and we validate the condition. If the condition is met, the suspected vulnerability is verified and a confirmed vulnerability set is added.

    4.2.3 Vulnerabilities repair

    CM-Droid's bug fixes are mainly for the vulnerability of the APP that has been confirmed in the local policy cache, and are dynamically repaired during the running of the APP.The entire repair process is divided into two phases, as shown in the Fig. 5

    Figure 5: Vulnerabilities repair

    Install phase:In the installation phase of vulnerability confirmation, CM-Droid obtains the CMRS file by PGS or CMRS gained by dynamically confirmed triggered updated.The PDP module extracts the acknowledgment vulnerability feature from the acknowledgment vulnerability set and sends it to the PEP module. After receiving the acknowledgment vulnerability feature, the PEP module extracts the key API and injects it.

    Launch phase:After the application is launched, it will be intercepted by the PEP module when it executes the key API with the confirmation vulnerability. The PEP module will determine whether the acquired information matches the vulnerability feature. Once the match is successful, the PEP requests the PDP module for the repair strategy corresponding to the vulnerability. The PDP sends a corresponding repair policy according to the vulnerability information, and the PEP module receives the repair policy and performs the vulnerability repair operation.

    5 Experiment and evaluation

    This chapter mainly tests and evaluates the CM-Droid-based Android client vulnerability repair tool designed in this paper, and verifies the accuracy and effectiveness of the tool for the repair of password misuse. This chapter firstly deploys the test environment, and then performs functional tests on CM-Droid. It mainly verifies whether the functions of CM-Droid can run normally, and then tests the performance of CM-Droid. Finally, the conclusions of the experimental analysis are obtained, and suggestions for improving performance are proposed.

    5.1 Test process design

    This section mainly introduces the design of the test process for CM-Droid, including the purpose of the test, the configuration of the test environment, the selection of test objects and the test method.

    5.1.1 Test purpose

    The purpose of this test is first to verify the feasibility of the CM-Droid, and then to evaluate some of the performance indicators of the test tool in the actual detection of the vulnerability.

    5.1.2 Test environment

    The CM-Droid designed in this paper can be divided into two parts, namely the static vulnerability scanning part on the server side and the dynamic behavior analysis part in the client side. In this test, the static vulnerability scanning part was deployed on the 0.4 version of the Santoku system.

    5.1.3 Test method

    In order to verify the repair effect of CM-Droid, we detected and repaired 15 popular applications through CM-Droid, manually analyzed the problems of 15 popular applications, and recorded the time and performance of CM-Droid detection.

    5.2 Test results and analysis

    5.2.1 Function test

    We focus on testing the actual detection and repair capabilities of CM-Droid for 12 types of password misuse vulnerabilities. We focus on 15 applications on the market, through PGS-side policy generation, client-side dynamic validation and bug fixes. We have established the following experimental data:

    Figure 6: Password misuse vulnerability detection and repair results

    For the experimental results, we performed a manual analysis of the missing KM-KSV vulnerability. After analysis, we believe that the KM-KSV vulnerability does not exist in popular applications. Popular apps don't store keys locally. At the same time, we analyze the ASE-CVV2 vulnerability. According to the experimental results, our tool CM-Droid can effectively detect the password misuse vulnerability in the application. At the same time, due to the triggering process, we actually fix fewer vulnerabilities than the detected vulnerability.

    5.2.2 Repair time assessment

    Our main time overhead is fixed in the CM-Droid container for password misuse vulnerabilities. So we perform a time performance assessment for the bug fix process.

    For the performance evaluation of time, we first evaluate the extra time taken by the CMDroid container for the repair application. We mainly test the time it takes for each type to go from repairing the trigger point to repairing the entire process. We tested each type of vulnerability for 1,000 times.

    According to our definition of the repair strategy, the repair methods can be divided into replacement repair (parameter repair (PF), storage repair (SF), key repair (KF)), block repair (BF), and early warning repair (WF). We will compare the time between the vulnerabilities that can be used in these three types of repair methods.

    Replacement fix:Due to the substitution of parameters, keys or storage locations, the repair time is related to the length of the encrypted data, so we use 12 bytes, 105 bytes,1280 bytes of data for repair operations.

    The replacement repair time has a linear relationship with the size of the encrypted data.In SE-AM, if the repair data is 1280 bytes, the program crashes directly. For practical reasons, if the encrypted data is too large, we will choose to block the repair and not replace it.

    Blocking fix:When there is a high-risk password misuse vulnerability in the encryption and decryption process, the vulnerability is fixed by forcibly blocking the data encryption and decryption process to avoid security risks. Due to the impact of the normal application process, we will pop up a dialog box, which is selected by the user.

    Warning fix:When there is password misuse vulnerability in the encryption and decryption process, by prompting the user to risk, the user actively chooses to stop the business logic to fix the vulnerability and avoid the security risk. The warning fix here is that we only calculate the time from the discovery of the vulnerability to the pop-up warning. The user's choice time is not in our consideration.

    The warning fix only prompts the user to make a selection, and the repair time is shorter.This does not hinder the original business logic, but requires the user to make a choice.

    5.2.3 Performance evaluation

    Our main performance overhead is for the launch and run of the application in the CMDroid container. So we perform performance evaluations for the startup and operation of the application in the CM-Droid. We use the Android Profiler for performance evaluation.For performance evaluation, an application may have multiple processes.

    The experimental results are shown in the Fig. 7, Fig. 8 and Fig. 9 respectively.

    Figure 7: Replacement fix

    Figure 8: Block fix

    Figure 9: Warn fix

    Memory evaluation:It is an evaluation of memory. We first evaluate the additional memory footprint of the CM-Droid container for repairing applications. We use the method of comparative testing. We tested the average memory and peak memory of the CM-Droid and compared the average memory and peak memory of the application when the CM-Droid is not running.

    After calculation, the average memory running in the CM-Droid is 5.1% more than not running in the CM-Droid. The peak memory running in the CM-Droid is 7.3% more than not running in the CM-Droid. The extra memory is consumed in an acceptable range. The experimental results are shown in the Fig. 10.

    Figure 10: Memory usage result

    CPU occupancy assessment:For the evaluation of CPU usage, we first evaluate the additional CPU usage that the CM-Droid container brings. We use the method of comparative testing. We tested the average CPU usage and peak CPU usage of the application in the CM-Droid and compare the average CPU usage and peak CPU usage of the application when they are not in the CM-Droid.

    After calculation, the average CPU usage running in the CM-Droid is 26.4% more than not running in the CM-Droid. The peak CPU usage running in the CM-Droid is 10.1%more than not running in the CM-Droid. The CPU usage is relatively high, which is related to our simulation of system services. The experimental results are shown in the Fig. 11.

    Figure 11: CPU usage result

    6 Conclusion

    This paper mainly summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability. And on this basis, this paper designs and implements a secure container for Android application software password misuse vulnerability: CM-Droid.Through experimentation, the additional time and memory loss increased by CM-Droid is within a acceptable range and achieves our predicted detection and repair results. But there are also some problems.

    First of all, we are currently only targeting Android systems below 4.4 and 4.4. For Android systems above 4.4 version which use the ART virtual machine, we have not conducted research. In further work, we will implement CM-Droid for systems above 4.4.Secondly, the current PGS end detection has not been fully automated, there are still steps of manual detection and verification, and there are some errors. In next steps, we are going to achieve full automation of detection on PGS.

    Acknowledgement:This work is supported by The National Natural Science Foundation of China Nos. U1536121, 61370195).

    99久国产av精品国产电影| 国产男人的电影天堂91| 精品国产露脸久久av麻豆 | 精品人妻熟女av久视频| 日韩成人av中文字幕在线观看| 日韩大片免费观看网站| 国产亚洲5aaaaa淫片| 亚洲av日韩在线播放| 岛国毛片在线播放| 少妇的逼水好多| 在线观看人妻少妇| 欧美丝袜亚洲另类| 日日干狠狠操夜夜爽| av一本久久久久| 爱豆传媒免费全集在线观看| 亚洲熟女精品中文字幕| 午夜日本视频在线| 在线观看av片永久免费下载| 少妇熟女aⅴ在线视频| 91狼人影院| 日韩一区二区视频免费看| 久久精品久久久久久久性| 久久久久精品性色| 一区二区三区乱码不卡18| 午夜亚洲福利在线播放| 夫妻午夜视频| 青春草亚洲视频在线观看| 免费观看a级毛片全部| 99久国产av精品| 97精品久久久久久久久久精品| 成人无遮挡网站| 99九九线精品视频在线观看视频| 亚洲av.av天堂| 日韩欧美精品v在线| 久久热精品热| 国产有黄有色有爽视频| h日本视频在线播放| 特级一级黄色大片| 80岁老熟妇乱子伦牲交| 国产亚洲av片在线观看秒播厂 | 老师上课跳d突然被开到最大视频| 亚洲人与动物交配视频| 欧美zozozo另类| 色综合站精品国产| 久久久久久伊人网av| 久久99蜜桃精品久久| 国产永久视频网站| 夫妻性生交免费视频一级片| 亚洲欧美日韩东京热| 亚洲自拍偷在线| 中文天堂在线官网| 黄色日韩在线| 亚洲精品一二三| 亚洲av成人精品一区久久| 亚洲久久久久久中文字幕| 日韩 亚洲 欧美在线| 性色avwww在线观看| 一区二区三区四区激情视频| 日本猛色少妇xxxxx猛交久久| 日韩精品有码人妻一区| 亚洲精品aⅴ在线观看| 人人妻人人澡人人爽人人夜夜 | 久久久久国产网址| 精品一区二区三卡| 色尼玛亚洲综合影院| 中文字幕亚洲精品专区| 非洲黑人性xxxx精品又粗又长| 久久久久精品性色| 精品久久久精品久久久| 国产免费视频播放在线视频 | 中文字幕人妻熟人妻熟丝袜美| 成人鲁丝片一二三区免费| 日韩 亚洲 欧美在线| 国内精品宾馆在线| 一区二区三区免费毛片| 欧美zozozo另类| 久久精品久久精品一区二区三区| 久久久精品94久久精品| 美女黄网站色视频| eeuss影院久久| 中文欧美无线码| 亚洲精品aⅴ在线观看| 国产成人精品久久久久久| 精品国产一区二区三区久久久樱花 | 777米奇影视久久| 亚洲美女视频黄频| 久久久久精品久久久久真实原创| 免费观看a级毛片全部| 最近中文字幕2019免费版| 青春草视频在线免费观看| 精品亚洲乱码少妇综合久久| 欧美日韩亚洲高清精品| 美女高潮的动态| 熟女人妻精品中文字幕| 能在线免费观看的黄片| 男人和女人高潮做爰伦理| 能在线免费看毛片的网站| 欧美日韩亚洲高清精品| 日本猛色少妇xxxxx猛交久久| 国产亚洲91精品色在线| 久久久成人免费电影| 精品久久久久久电影网| 国产伦精品一区二区三区视频9| 菩萨蛮人人尽说江南好唐韦庄| 一级毛片 在线播放| 中文精品一卡2卡3卡4更新| 天堂√8在线中文| 国产亚洲91精品色在线| 国产成人福利小说| 少妇的逼好多水| 夫妻午夜视频| 欧美精品国产亚洲| 精品久久国产蜜桃| 噜噜噜噜噜久久久久久91| 97在线视频观看| av一本久久久久| 国产综合精华液| 99九九线精品视频在线观看视频| 亚洲av电影在线观看一区二区三区 | 日韩在线高清观看一区二区三区| av在线亚洲专区| 97超碰精品成人国产| 亚洲性久久影院| 亚洲在久久综合| 免费av不卡在线播放| 最近中文字幕2019免费版| 国产高潮美女av| 汤姆久久久久久久影院中文字幕 | 成人特级av手机在线观看| 国产亚洲午夜精品一区二区久久 | 色综合站精品国产| 校园人妻丝袜中文字幕| 国产黄片视频在线免费观看| 久久6这里有精品| 精品久久久精品久久久| av女优亚洲男人天堂| or卡值多少钱| 久久精品综合一区二区三区| 男女国产视频网站| 校园人妻丝袜中文字幕| 91久久精品国产一区二区成人| av卡一久久| 日本一二三区视频观看| 在线 av 中文字幕| 国产精品一二三区在线看| 如何舔出高潮| 亚洲图色成人| 国产探花在线观看一区二区| 国产午夜精品一二区理论片| 久久亚洲国产成人精品v| 看免费成人av毛片| 国产老妇女一区| 成人毛片60女人毛片免费| 2022亚洲国产成人精品| 五月伊人婷婷丁香| 亚洲18禁久久av| 久久久久久国产a免费观看| 综合色丁香网| 亚洲国产精品成人综合色| 午夜福利视频1000在线观看| 国产淫片久久久久久久久| 国产亚洲一区二区精品| 亚洲美女搞黄在线观看| 十八禁国产超污无遮挡网站| 免费人成在线观看视频色| 免费av观看视频| 欧美不卡视频在线免费观看| 在线a可以看的网站| 亚洲电影在线观看av| 国产极品天堂在线| 又大又黄又爽视频免费| 亚洲精品乱久久久久久| 一级毛片久久久久久久久女| 欧美成人a在线观看| 51国产日韩欧美| 高清在线视频一区二区三区| 午夜免费观看性视频| 国产精品.久久久| 亚洲第一区二区三区不卡| 亚洲精品视频女| 黄片wwwwww| 亚洲国产欧美人成| 国精品久久久久久国模美| 午夜福利视频1000在线观看| 啦啦啦啦在线视频资源| 十八禁国产超污无遮挡网站| 亚洲av中文字字幕乱码综合| 免费大片黄手机在线观看| ponron亚洲| 少妇人妻一区二区三区视频| 国产 亚洲一区二区三区 | 美女黄网站色视频| 欧美性猛交╳xxx乱大交人| 一本久久精品| 色视频www国产| 最近最新中文字幕大全电影3| 熟妇人妻久久中文字幕3abv| 国产有黄有色有爽视频| 五月伊人婷婷丁香| 丰满乱子伦码专区| 免费观看无遮挡的男女| 乱系列少妇在线播放| 欧美高清性xxxxhd video| 成人午夜精彩视频在线观看| 国产精品99久久久久久久久| 免费无遮挡裸体视频| 日韩av不卡免费在线播放| 搡女人真爽免费视频火全软件| 久久久久久久午夜电影| 久久午夜福利片| 熟女人妻精品中文字幕| 欧美极品一区二区三区四区| 亚洲av中文字字幕乱码综合| 99久久九九国产精品国产免费| 亚洲欧美一区二区三区黑人 | 天堂网av新在线| 午夜精品一区二区三区免费看| 国产成人午夜福利电影在线观看| 特级一级黄色大片| 精品不卡国产一区二区三区| 亚洲av日韩在线播放| 国产精品无大码| 97超视频在线观看视频| 国产一区二区亚洲精品在线观看| 麻豆国产97在线/欧美| 在线观看美女被高潮喷水网站| 免费观看的影片在线观看| 午夜激情福利司机影院| 伊人久久国产一区二区| 色5月婷婷丁香| .国产精品久久| 亚洲精品亚洲一区二区| 亚洲国产精品专区欧美| 国产国拍精品亚洲av在线观看| 亚洲aⅴ乱码一区二区在线播放| 亚洲精品日本国产第一区| 中文字幕制服av| kizo精华| 亚洲电影在线观看av| 中文欧美无线码| 男女边吃奶边做爰视频| 日韩成人av中文字幕在线观看| 成人性生交大片免费视频hd| 欧美高清性xxxxhd video| 亚洲真实伦在线观看| 在线免费观看的www视频| 国产精品久久视频播放| 五月天丁香电影| 久久精品久久精品一区二区三区| 国产精品综合久久久久久久免费| 亚洲国产欧美在线一区| 麻豆乱淫一区二区| 国产av在哪里看| 国产极品天堂在线| 色吧在线观看| 18禁在线播放成人免费| 国内精品宾馆在线| 国产在线一区二区三区精| 国产成人freesex在线| 日韩欧美 国产精品| 亚洲欧美日韩无卡精品| 亚洲av成人精品一二三区| 国产成人福利小说| 亚洲va在线va天堂va国产| 国产精品久久久久久久久免| 国产伦精品一区二区三区四那| 人体艺术视频欧美日本| 黄片wwwwww| 深爱激情五月婷婷| 午夜爱爱视频在线播放| 国产色爽女视频免费观看| 亚洲经典国产精华液单| 国产精品无大码| 亚洲av电影在线观看一区二区三区 | 国产爱豆传媒在线观看| 热99在线观看视频| or卡值多少钱| 国产精品熟女久久久久浪| 丝瓜视频免费看黄片| 人人妻人人看人人澡| 黄色日韩在线| 蜜臀久久99精品久久宅男| 日韩大片免费观看网站| 国精品久久久久久国模美| 欧美3d第一页| 天堂av国产一区二区熟女人妻| 国产高清不卡午夜福利| 精品久久久久久久久亚洲| or卡值多少钱| 国产精品久久久久久精品电影小说 | 中国美白少妇内射xxxbb| 国产有黄有色有爽视频| 日本wwww免费看| 一二三四中文在线观看免费高清| 超碰97精品在线观看| 在线播放无遮挡| 你懂的网址亚洲精品在线观看| 久久国产乱子免费精品| 国产精品女同一区二区软件| 国产精品久久久久久精品电影小说 | 亚洲天堂国产精品一区在线| 国产探花极品一区二区| 亚洲成人中文字幕在线播放| 听说在线观看完整版免费高清| 亚洲人与动物交配视频| 在线观看人妻少妇| 在线a可以看的网站| 国产精品福利在线免费观看| 精品一区在线观看国产| 婷婷色综合www| 极品少妇高潮喷水抽搐| av福利片在线观看| 亚洲欧洲国产日韩| 天天躁日日操中文字幕| 亚洲图色成人| 精品国产一区二区三区久久久樱花 | 久久精品夜夜夜夜夜久久蜜豆| 深爱激情五月婷婷| 免费看日本二区| 成人高潮视频无遮挡免费网站| 美女主播在线视频| 综合色丁香网| 老女人水多毛片| ponron亚洲| 中文精品一卡2卡3卡4更新| videossex国产| 国产在线一区二区三区精| av福利片在线观看| 九九久久精品国产亚洲av麻豆| 六月丁香七月| 直男gayav资源| 99久久九九国产精品国产免费| 黄片无遮挡物在线观看| 日本av手机在线免费观看| 欧美丝袜亚洲另类| 久久久久免费精品人妻一区二区| 日韩人妻高清精品专区| 免费不卡的大黄色大毛片视频在线观看 | 国内精品宾馆在线| 国产精品麻豆人妻色哟哟久久 | 在线观看美女被高潮喷水网站| 亚洲精品中文字幕在线视频 | 日韩欧美精品免费久久| 色视频www国产| 久久久久国产网址| eeuss影院久久| 一个人免费在线观看电影| 韩国av在线不卡| 国产精品人妻久久久久久| 久久久久久久大尺度免费视频| 成人亚洲精品一区在线观看 | xxx大片免费视频| 亚洲四区av| 国产大屁股一区二区在线视频| 天堂中文最新版在线下载 | 看十八女毛片水多多多| 色综合亚洲欧美另类图片| 国语对白做爰xxxⅹ性视频网站| 国产综合懂色| 精品国产一区二区三区久久久樱花 | 人人妻人人澡欧美一区二区| 精品一区在线观看国产| 国产精品一二三区在线看| 午夜免费男女啪啪视频观看| 国产真实伦视频高清在线观看| 女人十人毛片免费观看3o分钟| 中文字幕制服av| 日本免费在线观看一区| 亚洲精品乱久久久久久| 亚洲欧美中文字幕日韩二区| 小蜜桃在线观看免费完整版高清| 国产一区二区三区av在线| av卡一久久| 免费少妇av软件| 久久精品人妻少妇| 国产黄色小视频在线观看| 九九爱精品视频在线观看| 免费观看av网站的网址| 一级a做视频免费观看| 国产精品国产三级国产专区5o| 免费大片黄手机在线观看| 国产 亚洲一区二区三区 | 禁无遮挡网站| 成人一区二区视频在线观看| 久久精品人妻少妇| 一夜夜www| 久久久久久久大尺度免费视频| 肉色欧美久久久久久久蜜桃 | 国产精品久久久久久精品电影| 高清欧美精品videossex| 欧美潮喷喷水| 亚洲精品视频女| 国精品久久久久久国模美| 十八禁国产超污无遮挡网站| 日韩一本色道免费dvd| 观看美女的网站| 内地一区二区视频在线| 永久网站在线| 偷拍熟女少妇极品色| 99热这里只有精品一区| 成人毛片60女人毛片免费| 综合色丁香网| 尤物成人国产欧美一区二区三区| av在线蜜桃| 国产精品女同一区二区软件| 内地一区二区视频在线| ponron亚洲| 一二三四中文在线观看免费高清| 亚洲图色成人| 成人毛片a级毛片在线播放| 男女边吃奶边做爰视频| 欧美 日韩 精品 国产| 三级经典国产精品| 床上黄色一级片| 免费看av在线观看网站| .国产精品久久| 夫妻午夜视频| 狠狠精品人妻久久久久久综合| 成年女人看的毛片在线观看| 99九九线精品视频在线观看视频| 久久精品国产鲁丝片午夜精品| 久久久亚洲精品成人影院| 日本av手机在线免费观看| 亚洲av成人精品一区久久| 蜜臀久久99精品久久宅男| 一区二区三区免费毛片| 亚洲人成网站在线观看播放| 热99在线观看视频| 国产精品美女特级片免费视频播放器| 国产精品一区二区三区四区免费观看| 国产精品国产三级国产av玫瑰| 99热6这里只有精品| 免费无遮挡裸体视频| 欧美另类一区| 亚洲图色成人| 亚洲av国产av综合av卡| av卡一久久| 亚洲精品一二三| 最近最新中文字幕免费大全7| 男人狂女人下面高潮的视频| 国产有黄有色有爽视频| 舔av片在线| 老女人水多毛片| 哪个播放器可以免费观看大片| 2021少妇久久久久久久久久久| 国产精品99久久久久久久久| 国产成年人精品一区二区| 国产69精品久久久久777片| 国产老妇女一区| 91久久精品国产一区二区三区| 老师上课跳d突然被开到最大视频| 自拍偷自拍亚洲精品老妇| 精品一区二区三区视频在线| 精品少妇黑人巨大在线播放| 99久久中文字幕三级久久日本| 嘟嘟电影网在线观看| 亚洲激情五月婷婷啪啪| 国产精品久久视频播放| 色5月婷婷丁香| 美女黄网站色视频| 国产精品伦人一区二区| 国产一级毛片七仙女欲春2| 成人综合一区亚洲| 成人午夜精彩视频在线观看| freevideosex欧美| 2021少妇久久久久久久久久久| 黄色配什么色好看| 噜噜噜噜噜久久久久久91| 色播亚洲综合网| 看黄色毛片网站| 777米奇影视久久| 国产久久久一区二区三区| 久久99精品国语久久久| 亚洲精品日本国产第一区| 免费无遮挡裸体视频| 亚洲最大成人av| 国产综合懂色| 美女主播在线视频| 免费在线观看成人毛片| 美女脱内裤让男人舔精品视频| 在线观看美女被高潮喷水网站| av专区在线播放| 精品国产三级普通话版| 国产69精品久久久久777片| 国产高潮美女av| 能在线免费看毛片的网站| 国产一区二区三区综合在线观看 | 在线观看免费高清a一片| 日韩在线高清观看一区二区三区| 亚州av有码| 欧美高清性xxxxhd video| 街头女战士在线观看网站| 2021少妇久久久久久久久久久| 在线a可以看的网站| 一区二区三区四区激情视频| 中文资源天堂在线| 久久久久久久午夜电影| 亚洲人成网站高清观看| 亚洲国产精品专区欧美| 久久久久久久大尺度免费视频| 亚洲真实伦在线观看| 成人性生交大片免费视频hd| 国产有黄有色有爽视频| 国产精品久久久久久av不卡| 亚洲在久久综合| 中国国产av一级| 成人午夜精彩视频在线观看| 久久久久久久久大av| 午夜福利成人在线免费观看| 黄片无遮挡物在线观看| 亚洲精品成人av观看孕妇| 1000部很黄的大片| 欧美xxxx黑人xx丫x性爽| 看十八女毛片水多多多| 最近中文字幕高清免费大全6| 亚洲欧美成人精品一区二区| 少妇的逼好多水| 夜夜爽夜夜爽视频| 亚洲av免费在线观看| 国产在线一区二区三区精| 免费播放大片免费观看视频在线观看| 国产单亲对白刺激| 国产极品天堂在线| 少妇人妻精品综合一区二区| 日本免费在线观看一区| 两个人视频免费观看高清| 18+在线观看网站| 亚洲最大成人av| 国产伦精品一区二区三区四那| 天堂√8在线中文| 夜夜爽夜夜爽视频| 黑人高潮一二区| 国产精品麻豆人妻色哟哟久久 | 久热久热在线精品观看| 国产精品福利在线免费观看| 国产美女午夜福利| 日本-黄色视频高清免费观看| 最后的刺客免费高清国语| 亚洲成色77777| 午夜福利视频精品| 伦理电影大哥的女人| 偷拍熟女少妇极品色| av在线亚洲专区| 中国国产av一级| 国产成人一区二区在线| 有码 亚洲区| 青春草视频在线免费观看| 日韩三级伦理在线观看| 十八禁国产超污无遮挡网站| 日日撸夜夜添| 亚洲天堂国产精品一区在线| 最新中文字幕久久久久| 18禁动态无遮挡网站| 美女大奶头视频| 麻豆精品久久久久久蜜桃| 人人妻人人澡欧美一区二区| 韩国av在线不卡| 久久99精品国语久久久| 久久久久性生活片| 久久99精品国语久久久| 日本黄色片子视频| 黄片无遮挡物在线观看| 国产精品国产三级国产专区5o| 亚洲真实伦在线观看| 日本黄色片子视频| 亚洲成人精品中文字幕电影| 亚洲成人一二三区av| 精品人妻视频免费看| 国产一级毛片在线| 在线观看一区二区三区| 亚洲人成网站在线播| 国产精品久久久久久精品电影| 中文字幕制服av| 欧美bdsm另类| 欧美 日韩 精品 国产| 精品人妻视频免费看| 免费看日本二区| 精品久久久久久久久亚洲| 亚洲精品国产av蜜桃| 黄片wwwwww| 高清毛片免费看| 七月丁香在线播放| 天堂影院成人在线观看| 国产精品人妻久久久影院| 青春草视频在线免费观看| 色哟哟·www| 亚洲国产日韩欧美精品在线观看| 视频中文字幕在线观看| 国产精品一区二区三区四区免费观看| 性插视频无遮挡在线免费观看| 亚洲成色77777| 最后的刺客免费高清国语| 在线天堂最新版资源| 在线 av 中文字幕| 久久热精品热| 建设人人有责人人尽责人人享有的 | 国产午夜精品久久久久久一区二区三区| 少妇人妻精品综合一区二区| 免费高清在线观看视频在线观看| 乱系列少妇在线播放| 男女边摸边吃奶| 干丝袜人妻中文字幕| 日韩中字成人| 国产亚洲av片在线观看秒播厂 | 久久久色成人| 日韩av不卡免费在线播放| 麻豆av噜噜一区二区三区| 婷婷色综合大香蕉| 成年av动漫网址| 免费电影在线观看免费观看| 青春草视频在线免费观看| 国产亚洲最大av| 人人妻人人看人人澡| 男女边吃奶边做爰视频| 亚洲精华国产精华液的使用体验|