Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (7): 33-46.doi: 10.11959/j.issn.2096-109x.2017.00178

• Papers • Previous Articles     Next Articles

Symbolic execution based control flow graph extraction method for Android native codes

Hui-ying YAN,Zhen-ji ZHOU,Li-fa WU,Zheng HONG,He SUN   

  1. Institute of Command Information System,PLA University of Science and Technology,Nanjing 210000,China
  • Revised:2017-06-09 Online:2017-07-01 Published:2017-08-01
  • Supported by:
    The Natural Science Foundation of Jiangsu Province(2017YFB0802900);The National Key Research and Development Program of China(BK20131069)

Abstract:

A symbolic execution based method was proposed to automatically extract control flow graphs from native libraries of Android applications.The proposed method can provide execution environments for functions in native libraries,simulate JNI function call processes and solve symbols using constraint solver.A control flow graph extraction prototype system named CFGNative was implemented.The experiment results show that CFGNative can accurately distinguish all the JNI function calls and native methods of the representative example,and reach high code coverage within acceptable time.

Key words: control flow graph, Android application, native code, symbolic execution

CLC Number: 

No Suggested Reading articles found!