A Mitmproxy-based Dynamic Vulnerability Detection System for Android Applications

Xinghang Lv,Tao Peng,Junwei Tang,Ruhan He,Xinrong Hu,Minghua Jiang,Zaihui Deng,Wenli Cao
DOI: https://doi.org/10.1109/msn57253.2022.00072
2022-01-01
Abstract:During the process of pushing patch packets for Android application hotfix, the attacker can hijack and tamper with the dex file due to the lack of adding a digital signature, which leads to code injection with serious consequences. To address the above problems, an dynamic vulnerability detection system based on mitmproxy is primary proposed, which first utilizes mitmproxy to capture all the packets interacted between the client and the server while locating the dex file, then injects the test code into the dex and pushes it to the client for execution using a man-in-the-middle attack, and finally verifies through the log output by the application whether there is a code injection vulnerability. For 1000 applications in the application market, our system successfully detects 34 new unknown applications with dex injection, and the experimental results show that the system is effective in detecting real-world applications with vulnerabilities caused by hotfix.
What problem does this paper attempt to address?