Publications-Theses
Article View/Open
Publication Export
-
題名 靜態廣告欺詐行為偵測技術研究-以 iOS 為例
Static ad fraud detection on iOS applications作者 黃存宇
Huang, Cun-Yu貢獻者 郁方
Yu, Fang
黃存宇
Huang, Cun-Yu關鍵詞 靜態分析
廣告欺詐檢測
iOS
行動應用程式
資訊安全
Static analysis
Ad fraud detection
iOS
Mobile application
Software security日期 2019 上傳時間 5-Feb-2020 17:26:32 (UTC+8) 摘要 手機App成為最受歡迎和占主導地位的軟體應用程式之一,應用程序開發人員從應用程序廣告中獲得了可觀的利潤。在應用程式中,以適當的方式呈現廣告對客戶和廣告商都有好處,但是在我們的研究中,卻發現各種廣告欺詐。廣告欺詐會破壞用戶體驗或廣告效果,但是開發人員可以從中獲得更多的利潤。在我們研究中,提出了一種靜態分析技術來檢查iOS應用程式上的廣告欺詐行為。我們會檢測出插頁式廣告,尺寸違反廣告,多重廣告和重疊式廣告的廣告欺詐行為。為了檢測這些違規,它需要使用應用程序中的特定參數來識別廣告API調用,通過動態調用很難檢測到,因為確切的調用及其參數取決於嵌套參數的運行時候的值。我們在iOS的可執行文件上採用靜態分析技術,通過該技術我們可以對目標函數的參數構建依賴關係圖。然後,我們對依賴關係圖進行字串分析,以呈現潛在的API調用及其對廣告欺詐違規的參數值。我們已經分析了上千個應用程序,這些應用程序由我們之前的應用程序靜態分析工具Binflow構造了控制流程圖,並發現208個應用程序使用了與廣告相關API的動態調用。我們進一步發現了70個具有插頁式廣告欺詐,48個具有尺寸違反廣告欺詐,31個具有多重廣告欺詐和19個具有重疊式廣告廣告欺詐。
While mobile applications (apps) become one of the most popular and dominant software applications, app developers (particularly for those who deliver free apps) gain considerable parts of profits from advertisements on apps. Demonstrating ads on apps in a suitable way benefits both customers and advertisers. Various ad frauds have been identified with which developers may gain extra benefits but damage user experience or advertisement effects. We present a static analysis technique to check ad frauds of iOS apps in this work. Particularly, we detect apps that have their ads against interstitial violation, size violation, multi-view and overlap violation. To detect these violations, it requires to identify advertisement API invocation with specific arguments in apps. It becomes hard to detect with dynamic invocation where exact calls and their arguments depend on runtime values of nested parameters. We adopt static flow analysis techniques on iOS executable with which we build dependency graphs on parameters of target functions. We then conduct string analysis on dependency graphs to reveal potential API invocations with their argument values on ad fraud violations.We have analyzed more than one thousand apps that have their control flow graphs constructed by our previous app static analysis tool Binflow, and found 208 apps using dynamic invocations on Ad related API calls. We further identified 70 apps having interstitial-violation ads, 48 apps having size violation ads, 31 apps having multi-view violation ads, and 19 apps having overlay violation ads.參考文獻 [1] M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, \\Unsafe exposure analysisof mobile in-app advertisements," in Proceedings of the Lfth ACM conference onSecurity and Privacy in Wireless and Mobile Networks, pp. 101{112, ACM, 2012.[2] D. Graziano, \\Android and iOS Still Rule the Mobile World;Microsoft and RIM HaveLong Roads Ahead." https://www.appannie.com/en/insights/market-data/app-advertising-spend-2021/, 2012.[3] Google, \\Google Admob." https://admob.google.com/, 2019.[4] Apple, \\Apple Search Ads." https://searchads.apple.com/, 2019.[5] Facebook, \\Facebook Ad." https://www.facebook.com/business/ads, 2019.[6] A. Mamiit, \\Googleags preinstalled malware as hidden threat on mil-lions of Android phones." https://www.digitaltrends.com/mobile/android-phones-preinstalled-malware, 2019.[7] Google, \\Google Behavioral policies." https://support.google.com/admob/answer/2753860, 2019.[8] B. Liu, S. Nath, R. Govindan, and J. Liu, \\fDECAFg: Detecting and characterizingad fraud in mobile apps," in 11th fUSENIXg Symposium on Networked SystemsDesign and Implementation (fNSDIg 14), pp. 57{70, 2014.[9] F. Dong, H. Wang, L. Li, Y. Guo, T. F. BissyandSe, T. Liu, G. Xu, and J. Klein,\\Frauddroid: Automated ad fraud detection for android apps," in Proceedings of the2018 26th ACM Joint Meeting on European Software Engineering Conference andSymposium on the Foundations of Software Engineering, pp. 257{268, ACM, 2018.[10] B. Wang, F. Wu, and G. Chen, \\Placement fraud detection on smart phones: A jointcrowdsourcing and data analyzing based approach," in International Conference onMobile Ad-Hoc and Sensor Networks, pp. 163{179, Springer, 2017.[11] V. Dave, S. Guha, and Y. Zhang, \\Viceroi: Catching click-spam in search ad net-works," in Proceedings of the 2013 ACM SIGSAC conference on Computer & com-munications security, pp. 765{776, ACM, 2013.[12] \\Google AD Size." https://developers.google.com/admob/ios/banner.[13] V. Dave, S. Guha, and Y. Zhang, \\Measuring and Lngerprinting click-spam in adnetworks," in Proceedings of the ACM SIGCOMM 2012 conference on Applications,technologies, architectures, and protocols for computer communication, pp. 175{186,ACM, 2012.[14] T. Yeh, T.-H. Chang, and R. C. Miller, \\Sikuli: using gui screenshots for search andautomation," in Proceedings of the 22nd annual ACM symposium on User interfacesoftware and technology, pp. 183{192, ACM, 2009.[15] Apple, \\Apple Developer Documentation." https://developer.apple.com/documentation/, 2019.[16] P. Z. Ian Beer, \\A very deep dive into iOS Exploit chains foundin the wild." https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html, 2019.[17] W. Wang, I. L. Kim, and Y. Zheng, \\Adjust: runtime mitigation of resource abus-ing third-party online ads," in Proceedings of the 41st International Conference onSoftware Engineering, pp. 1005{1015, IEEE Press, 2019.[18] W. Yang, M. Prasad, and T. Xie, \\Enmobile: Entity-based characterization andanalysis of mobile malware," in 2018 IEEE/ACM 40th International Conference onSoftware Engineering (ICSE), pp. 384{394, IEEE, 2018.[19] P. Z. Ian Beer, \\In-the-wild iOS Exploit Chain 1." https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html, 2019.[20] H.Wang and Y. Guo, \\Understanding third-party libraries in mobile app analysis," in2017 IEEE/ACM 39th International Conference on Software Engineering Companion(ICSE-C), pp. 515{516, IEEE, 2017.[21] D. M. Lazer, M. A. Baum, Y. Benkler, A. J. Berinsky, K. M. Greenhill, F. Menczer,M. J. Metzger, B. Nyhan, G. Pennycook, D. Rothschild, et al., \\The science of fakenews," Science, vol. 359, no. 6380, pp. 1094{1096, 2018.[22] A. Kantchelian, M. C. Tschantz, S. Afroz, B. Miller, V. Shankar, R. Bachwani, A. D.Joseph, and J. D. Tygar, \\Better malware ground truth: Techniques for weightinganti-virus vendor labels," in Proceedings of the 8th ACM Workshop on ArticialIntelligence and Security, pp. 45{56, ACM, 2015.[23] B. J. Kwon, J. Mondal, J. Jang, L. Bilge, and T. DumitraXs, \\The dropper effect:Insights into malware distribution with downloader graph analytics," in Proceedingsof the 22nd ACM SIGSAC Conference on Computer and Communications Security,pp. 1118{1129, ACM, 2015.[24] K. Chen, X. Wang, Y. Chen, P. Wang, Y. Lee, X. Wang, B. Ma, A. Wang, Y. Zhang,and W. Zou, \\Following devil`s footprints: Cross-platform analysis of potentiallyharmful libraries on android and ios," in 2016 IEEE Symposium on Security andPrivacy (SP), pp. 357{376, IEEE, 2016.[25] X. Liao, K. Yuan, X.Wang, Z. Pei, H. Yang, J. Chen, H. Duan, K. Du, E. Alowaisheq,S. Alrwais, et al., \\Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search," in 2016 IEEE Symposiumon Security and Privacy (SP), pp. 707{723, IEEE, 2016.[26] S. Roy, J. DeLoach, Y. Li, N. Herndon, D. Caragea, X. Ou, V. P. Ranganath, H. Li,and N. Guevara, \\Experimental study with real-world data for android app secu-rity analysis using machine learning," in Proceedings of the 31st Annual ComputerSecurity Applications Conference, pp. 81{90, ACM, 2015.[27] F. Wei, S. Roy, X. Ou, et al., \\Amandroid: a precise and general inter-componentdataow analysis framework for security vetting of android apps," ACM Transactionson Privacy and Security (TOPS), vol. 21, no. 3, p. 14, 2018.[28] H. Chen, H.-f. Leung, B. Han, and J. Su, \\Automatic privacy leakage detectionfor massive android apps via a novel hybrid approach," in 2017 IEEE InternationalConference on Communications (ICC), pp. 1{7, IEEE, 2017.[29] X. Pan, X. Wang, Y. Duan, X. Wang, and H. Yin, \\Dark hazard: Learning-based,large-scale discovery of hidden sensitive operations in android apps.," in NDSS, 2017.[30] A. Armando, G. Costa, A. Merlo, and L. Verderame, \\Enabling byod through securemeta-market," in Proceedings of the 2014 ACM conference on Security and privacyin wireless & mobile networks, pp. 219{230, ACM, 2014.[31] Y. Nan, M. Yang, Z. Yang, S. Zhou, G. Gu, and X. Wang, \\Uipicker: User-input pri-vacy identifcation in mobile applications," in 24th fUSENIXg Security Symposium(fUSENIXg Security 15), pp. 993{1008, 2015.[32] J. Huang, Z. Li, X. Xiao, Z. Wu, K. Lu, X. Zhang, and G. Jiang, \\fSUPORg: Preciseand scalable sensitive user input detection for android apps," in 24th fUSENIXgSecurity Symposium (fUSENIXg Security 15), pp. 977{992, 2015.[33] Z. Qu, V. Rastogi, X. Zhang, Y. Chen, T. Zhu, and Z. Chen, \\Autocog: Measur-ing the description-to-permission ldelity in android applications," in Proceedings ofthe 2014 ACM SIGSAC Conference on Computer and Communications Security,pp. 1354{1365, ACM, 2014.[34] R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, \\fWHYPERg: Towards au-tomating risk assessment of mobile applications," in Presented as part of the 22ndfUSENIXg Security Symposium (fUSENIXg Security 13), pp. 527{542, 2013.[35] P. Suciu, \\The Biggest Cybercrime Threats of 2019." https://www.ecommercetimes.com/story/85782.html, 2019.[36] A. Metwally, D. Agrawal, and A. El Abbadi, \\Detectives: detecting coalition hitination attacks in advertising networks streams," in Proceedings of the 16th inter-national conference on World Wide Web, pp. 241{250, ACM, 2007.[37] A. Metwally, F. Emekci, D. Agrawal, and A. El Abbadi, \\Sleuth: Single-publisherattack detection using correlation hunting," Proceedings of the VLDB Endowment,vol. 1, no. 2, pp. 1217{1228, 2008.[38] F. Yu, Y. Xie, and Q. Ke, \\Sbotminer: large scale search bot detection," in Pro-ceedings of the third ACM international conference on Web search and data mining,pp. 421{430, ACM, 2010.[39] S. A. Alrwais, A. Gerber, C. W. Dunn, O. Spatscheck, M. Gupta, and E. Osterweil,\\Dissecting ghost clicks: Ad fraud via misdirected human clicks," in Proceedings ofthe 28th Annual Computer Security Applications Conference, pp. 21{30, ACM, 2012.[40] T. Blizard and N. Livic, \\Click-fraud monetizing malware: A survey and case study,"in 2012 7th International Conference on Malicious and Unwanted Software, pp. 67{72, IEEE, 2012.[41] J. Crussell, R. Stevens, and H. Chen, \\Madfraud: Investigating ad fraud in androidapplications," in Proceedings of the 12th annual international conference on Mobilesystems, applications, and services, pp. 123{134, ACM, 2014.[42] X. Xiao, X. Wang, Z. Cao, H. Wang, and P. Gao, \\Iconintent: automatic identi-cation of sensitive ui widgets based on icon classication for android apps," in Pro-ceedings of the 41st International Conference on Software Engineering, pp. 257{268,IEEE Press, 2019.[43] P. Wang, D. Wu, Z. Chen, and T. Wei, \\Protecting million-user ios apps with ob-fuscation: motivations, pitfalls, and experience," in 2018 IEEE/ACM 40th Interna-tional Conference on Software Engineering: Software Engineering in Practice Track(ICSE-SEIP), pp. 235{244, IEEE, 2018.[44] A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, \\A survey of mobilemalware in the wild," in Proceedings of the 1st ACM Workshop on Security andPrivacy in Smartphones and Mobile Devices, SPSM `11, pp. 3{14, 2011.[45] S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. L. Traon,D. Octeau, and P. McDaniel, \\Flowdroid: precise context,ow, eld, object-sensitiveand lifecycle-aware taint analysis for android apps," in ACM SIGPLAN Conferenceon Programming Language Design and Implementation, PLDI `14, Edinburgh, UnitedKingdom - June 09 - 11, 2014, p. 29, 2014.[46] L. Li, T. F. Bissyande, D. Octeau, and J. Klein, \\Droidra: taming reection tosupport whole-program analysis of android apps," in Proceedings of the 25th Inter-national Symposium on Software Testing and Analysis, pp. 318{329, ACM, 2016.[47] W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. Mc-Daniel, and A. N. Sheth, \\Taintdroid: an information-ow tracking system for real-time privacy monitoring on smartphones," ACM Transactions on Computer Systems(TOCS), vol. 32, no. 2, p. 5, 2014.[48] T. Bao, J. Burket, M. Woo, R. Turner, and D. Brumley, \\Byteweight: Learning torecognize functions in binary code," in Proceedings of the 23rd USENIX Conferenceon Security Symposium, SEC`14, pp. 845{860, USENIX Association, 2014.[49] X. Meng and B. P. Miller, \\Binary code is not easy," in Proceedings of the 25thInternational Symposium on Software Testing and Analysis, ISSTA 2016, pp. 24{35,ACM, 2016.[50] Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino, A. Dutcher, J. Grosen,S. Feng, C. Hauser, C. Kruegel, et al., \\Sok:(state of) the art of war: Offensivetechniques in binary analysis," in 2016 IEEE Symposium on Security and Privacy(SP), pp. 138{157, IEEE, 2016.[51] T. Reinbacher and J. Brauer, \\Precise controlow reconstruction using booleanlogic," in Proceedings of the Ninth ACM International Conference on Embedded Soft-ware, EMSOFT `11, pp. 117{126, ACM, 2011.[52] D. Brumley, I. Jager, T. Avgerinos, and E. J. Schwartz, \\BAP: A binary analysisplatform," in Computer Aided Verication - 23rd International Conference, CAV2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings, pp. 463{469, 2011.[53] Dynist, \\Dynist: Tools for binary instrumentation, analysis, and modication."https://github.com/dyninst.[54] D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. New-some, P. Poosankam, and P. Saxena, \\Bitblaze: A new approach to computer securityvia binary analysis," in Proceedings of the 4th International Conference on Informa-tion Systems Security, ICISS `08, pp. 1{25, 2008.[55] Y. Lee, X. Wang, K. Lee, X. Liao, X. Wang, T. Li, and X. Mi, \\Understandingios-based crowdturng through hidden fUIg analysis," in 28th fUSENIXg SecuritySymposium (fUSENIXg Security 19), pp. 765{781, 2019.[56] C. Xiao, \\Pirated iOS App Stores Client Successfully Evaded Ap-ple iOS Code Review." https://unit42.paloaltonetworks.com/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/,2016.[57] N. Statt, \\This illicit iPhone app store has been hiding inplain sight." https://www.theverge.com/2019/2/20/18232140/apple-tutuapp-piracy-ios-apps-developer-enterprise-program-misuse,2019.[58] C.-H. Lin, F. Yu, J.-H. R. Jiang, and T. Bultan, \\Static detection of api call vulner-abilities in ios executables," in 2018 IEEE/ACM 40th International Conference onSoftware Engineering: Companion (ICSE-Companion), pp. 394{395, IEEE, 2018.[59] M. Egele, C. Kruegel, E. Kirda, and G. Vigna, \\Pios: Detecting privacy leaks in iosapplications.," in NDSS, 2011.[60] T.Werthmann, R. Hund, L. Davi, A.-R. Sadeghi, and T. Holz, \\Psios: bring your ownprivacy & security to ios devices," in Proceedings of the 8th ACM SIGSAC symposiumon Information, computer and communications security, pp. 13{24, ACM, 2013.[61] L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nurnberger,and A.-R. Sadeghi, \\Moc: A framework to mitigate control-ow attacks on smart-phones.," in NDSS, 2012.[62] Z. Deng, B. Saltaformaggio, X. Zhang, and D. Xu, \\iris: Vetting private api abuse inios applications," in Proceedings of the 22nd ACM SIGSAC Conference on Computerand Communications Security, pp. 44{56, ACM, 2015.[63] F. Yu, Y.-C. Lee, S. Tai, and W.-S. Tang, \\Appbeach: Characterizing app behaviorsvia static binary analysis," in Proceedings of the 2013 IEEE Second InternationalConference on Mobile Services, p. 86, IEEE Computer Society, 2013.[64] Z. R. Fang, S. W. Huang, and F. Yu, \\Appreco: Behavior-aware recommendation forios mobile applications," in 2016 IEEE International Conference on Web Services(ICWS), pp. 492{499, June 2016.[65] A. S. Christensen, A. Mller, and M. I. Schwartzbach, \\Precise analysis ofstring expressions," in Proc. 10th International Static Analysis Symposium (SAS),vol. 2694 of LNCS, pp. 1{18, Springer-Verlag, June 2003. Available fromhttp://www.brics.dk/JSA/.[66] C. Gould, Z. Su, and P. Devanbu, \\Static checking of dynamically generated queriesin database applications," in Software Engineering, 2004. ICSE 2004. Proceedings.26th International Conference on, pp. 645{654, IEEE, 2004.[67] P. A. Abdulla, M. F. Atig, Y.-F. Chen, L. Holk, A. Rezine, P. Rummer, and J. Sten-man, \\String constraints for verication," in International Conference on ComputerAided Verication, pp. 150{166, Springer, 2014.[68] A. Das, S. K. Lahiri, A. Lal, and Y. Li, \\Angelic verication: Precise vericationmodulo unknowns," in International Conference on Computer Aided Verication,pp. 324{342, Springer, 2015.[69] J. Schutte and D. Titze, \\lios: Lifting ios apps for fun and prot," 2019.[70] \\Hex-Rays Decompiler Manual." https://www.hex-rays.com/products/decompiler/manual/tricks.shtml.[71] J. Webber, \\A programmatic introduction to neo4j," in Proceedings of the 3rd an-nual conference on Systems, programming, and applications: software for humanity,pp. 217{218, ACM, 2012.[72] Facebook, \\Facebook Infer: Linters bug types-Unavailable api in supported iossdk ." https://fbinfer.com/docs/linters-bug-types.html#UNAVAILABLE_API_IN_SUPPORTED_IOS_SDK, 2019.[73] C. Calcagno, D. Distefano, J. Dubreil, D. Gabi, P. Hooimeijer, M. Luca, P. OHearn,I. Papakonstantinou, J. Purbrick, and D. Rodriguez, \\Moving fast with softwareverication," in NASA Formal Methods Symposium, pp. 3{11, Springer, 2015.[74] D. Distefano, P. W. Ohearn, and H. Yang, \\A local shape analysis based on separationlogic," in International Conference on Tools and Algorithms for the Construction andAnalysis of Systems, pp. 287{302, Springer, 2006.[75] C. Calcagno, D. Distefano, P. W. Ohearn, and H. Yang, \\Compositional shape anal-ysis by means of bi-abduction," Journal of the ACM (JACM), vol. 58, no. 6, p. 26,2011.[76] J. Berdine, C. Calcagno, and P. W. Ohearn, \\Smallfoot: Modular automatic assertionchecking with separation logic," in International Symposium on Formal Methods forComponents and Objects, pp. 115{137, Springer, 2005.[77] P. Cousot, \\Abstract interpretation in a nutshell," howpublished, 7th October, 2012.[78] Facebook, \\Facebook Infer: linters.al." https://github.com/facebook/infer/blob/472f155a7a1a5afa95f46d4300137e58cb1fa643/infer/lib/linter_rules/linters.al, 2019.[79] Facebook, \\Facebook Infer: cPredicates.ml." https://github.com/facebook/infer/blob/86140581d5e8690ac8ba82965aaa9d970acbb78e/infer/src/al/cPredicates.ml, 2019.[80] M. Pradel and K. Sen, \\Deepbugs: A learning approach to name-based bug detec-tion," Proceedings of the ACM on Programming Languages, vol. 2, no. OOPSLA,p. 147, 2018.[81] R. van Tonder and C. Le Goues, \\Static automated program repair for heap prop-erties," in 2018 IEEE/ACM 40th International Conference on Software Engineering(ICSE), pp. 151{162, IEEE, 2018.[82] M. Harman and P. O`Hearn, \\From start-ups to scale-ups: Opportunities and openproblems for static and dynamic program analysis," in 2018 IEEE 18th InternationalWorking Conference on Source Code Analysis and Manipulation (SCAM), pp. 1{23,IEEE, 2018.[83] N. Alshahwan, X. Gao, M. Harman, Y. Jia, K. Mao, A. Mols, T. Tei, and I. Zorin,\\Deploying search based software engineering with sapienz at facebook," in Interna-tional Symposium on Search Based Software Engineering, pp. 3{45, Springer, 2018.[84] Facebook, \\Facebook Infer: AL-examples." https://fbinfer.com/docs/linters.html#examples, 2019.[85] Apple, \\App Store Review Guidelines." https://developer.apple.com/app-store/review/guidelines, 2019.[86] ARM, \\ARM Information Center." http://infocenter.arm.com/help/index.jsp,2009.[87] soslab nccu, \\Github: Static Ad Fraud Detection on iOS Applications." https://github.com/soslab-nccu/detect-adfraud, 2019.[88] soslab nccu, \\Github: BinFlow-Static Detection of API Call Vulnerabilities in iOSExecutables." https://github.com/soslab-nccu/binflow, 2018.[89] C. Y. Huang, \\Video link of App 1077052682." https://drive.google.com/drive/folders/1ep4RiMFPcL4CbfY05ZGc11UMAYGqHkA3?usp=sharing, 2019. 描述 碩士
國立政治大學
資訊管理學系
106356036資料來源 http://thesis.lib.nccu.edu.tw/record/#G0106356036 資料類型 thesis dc.contributor.advisor 郁方 zh_TW dc.contributor.advisor Yu, Fang en_US dc.contributor.author (Authors) 黃存宇 zh_TW dc.contributor.author (Authors) Huang, Cun-Yu en_US dc.creator (作者) 黃存宇 zh_TW dc.creator (作者) Huang, Cun-Yu en_US dc.date (日期) 2019 en_US dc.date.accessioned 5-Feb-2020 17:26:32 (UTC+8) - dc.date.available 5-Feb-2020 17:26:32 (UTC+8) - dc.date.issued (上傳時間) 5-Feb-2020 17:26:32 (UTC+8) - dc.identifier (Other Identifiers) G0106356036 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/128563 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊管理學系 zh_TW dc.description (描述) 106356036 zh_TW dc.description.abstract (摘要) 手機App成為最受歡迎和占主導地位的軟體應用程式之一,應用程序開發人員從應用程序廣告中獲得了可觀的利潤。在應用程式中,以適當的方式呈現廣告對客戶和廣告商都有好處,但是在我們的研究中,卻發現各種廣告欺詐。廣告欺詐會破壞用戶體驗或廣告效果,但是開發人員可以從中獲得更多的利潤。在我們研究中,提出了一種靜態分析技術來檢查iOS應用程式上的廣告欺詐行為。我們會檢測出插頁式廣告,尺寸違反廣告,多重廣告和重疊式廣告的廣告欺詐行為。為了檢測這些違規,它需要使用應用程序中的特定參數來識別廣告API調用,通過動態調用很難檢測到,因為確切的調用及其參數取決於嵌套參數的運行時候的值。我們在iOS的可執行文件上採用靜態分析技術,通過該技術我們可以對目標函數的參數構建依賴關係圖。然後,我們對依賴關係圖進行字串分析,以呈現潛在的API調用及其對廣告欺詐違規的參數值。我們已經分析了上千個應用程序,這些應用程序由我們之前的應用程序靜態分析工具Binflow構造了控制流程圖,並發現208個應用程序使用了與廣告相關API的動態調用。我們進一步發現了70個具有插頁式廣告欺詐,48個具有尺寸違反廣告欺詐,31個具有多重廣告欺詐和19個具有重疊式廣告廣告欺詐。 zh_TW dc.description.abstract (摘要) While mobile applications (apps) become one of the most popular and dominant software applications, app developers (particularly for those who deliver free apps) gain considerable parts of profits from advertisements on apps. Demonstrating ads on apps in a suitable way benefits both customers and advertisers. Various ad frauds have been identified with which developers may gain extra benefits but damage user experience or advertisement effects. We present a static analysis technique to check ad frauds of iOS apps in this work. Particularly, we detect apps that have their ads against interstitial violation, size violation, multi-view and overlap violation. To detect these violations, it requires to identify advertisement API invocation with specific arguments in apps. It becomes hard to detect with dynamic invocation where exact calls and their arguments depend on runtime values of nested parameters. We adopt static flow analysis techniques on iOS executable with which we build dependency graphs on parameters of target functions. We then conduct string analysis on dependency graphs to reveal potential API invocations with their argument values on ad fraud violations.We have analyzed more than one thousand apps that have their control flow graphs constructed by our previous app static analysis tool Binflow, and found 208 apps using dynamic invocations on Ad related API calls. We further identified 70 apps having interstitial-violation ads, 48 apps having size violation ads, 31 apps having multi-view violation ads, and 19 apps having overlay violation ads. en_US dc.description.tableofcontents Contents1 Introduction 11.1 Ad fraud 11.2 Discoveries 31.3 Contributions 42 Related Works 52.1 Mobile Security 52.2 Detecting Ad fraud 72.3 Static analysis 82.4 Static analysis on iOS application 103 A Motivating Example 144 Ad fraud detection analysis 194.1 Static Analysis on iOS application 194.1.1 Preprocessing 204.1.2 Control Flow Graph Construction 204.1.3 Dependency Graph Construction 224.2 Overview of Ad fraud detection analysis 234.3 Find the Ad Related API 254.4 Check Ad fraud 264.4.1 Interstitial violation Ad fraud 274.4.2 Size violation Ad fraud 284.4.3 Multi-view violation Ad fraud 304.4.4 Overlay-view violation Ad fraud 315 Evaluation 315.1 Environment 315.2 Result of detecting Ad related API 335.3 Result of Ad fraud detection 345.3.1 Result of Interstitial violation Ad fraud 345.3.2 Result of Size violation Ad fraud 385.3.3 Result of Multi-view violation Ad fraud 435.3.4 Result of Overlay-view violation Ad fraud 475.4 Result of Pirate App Store 516 Conclusion 53References 54 zh_TW dc.format.extent 4948718 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0106356036 en_US dc.subject (關鍵詞) 靜態分析 zh_TW dc.subject (關鍵詞) 廣告欺詐檢測 zh_TW dc.subject (關鍵詞) iOS zh_TW dc.subject (關鍵詞) 行動應用程式 zh_TW dc.subject (關鍵詞) 資訊安全 zh_TW dc.subject (關鍵詞) Static analysis en_US dc.subject (關鍵詞) Ad fraud detection en_US dc.subject (關鍵詞) iOS en_US dc.subject (關鍵詞) Mobile application en_US dc.subject (關鍵詞) Software security en_US dc.title (題名) 靜態廣告欺詐行為偵測技術研究-以 iOS 為例 zh_TW dc.title (題名) Static ad fraud detection on iOS applications en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) [1] M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, \\Unsafe exposure analysisof mobile in-app advertisements," in Proceedings of the Lfth ACM conference onSecurity and Privacy in Wireless and Mobile Networks, pp. 101{112, ACM, 2012.[2] D. Graziano, \\Android and iOS Still Rule the Mobile World;Microsoft and RIM HaveLong Roads Ahead." https://www.appannie.com/en/insights/market-data/app-advertising-spend-2021/, 2012.[3] Google, \\Google Admob." https://admob.google.com/, 2019.[4] Apple, \\Apple Search Ads." https://searchads.apple.com/, 2019.[5] Facebook, \\Facebook Ad." https://www.facebook.com/business/ads, 2019.[6] A. Mamiit, \\Googleags preinstalled malware as hidden threat on mil-lions of Android phones." https://www.digitaltrends.com/mobile/android-phones-preinstalled-malware, 2019.[7] Google, \\Google Behavioral policies." https://support.google.com/admob/answer/2753860, 2019.[8] B. Liu, S. Nath, R. Govindan, and J. Liu, \\fDECAFg: Detecting and characterizingad fraud in mobile apps," in 11th fUSENIXg Symposium on Networked SystemsDesign and Implementation (fNSDIg 14), pp. 57{70, 2014.[9] F. Dong, H. Wang, L. Li, Y. Guo, T. F. BissyandSe, T. Liu, G. Xu, and J. Klein,\\Frauddroid: Automated ad fraud detection for android apps," in Proceedings of the2018 26th ACM Joint Meeting on European Software Engineering Conference andSymposium on the Foundations of Software Engineering, pp. 257{268, ACM, 2018.[10] B. Wang, F. Wu, and G. Chen, \\Placement fraud detection on smart phones: A jointcrowdsourcing and data analyzing based approach," in International Conference onMobile Ad-Hoc and Sensor Networks, pp. 163{179, Springer, 2017.[11] V. Dave, S. Guha, and Y. Zhang, \\Viceroi: Catching click-spam in search ad net-works," in Proceedings of the 2013 ACM SIGSAC conference on Computer & com-munications security, pp. 765{776, ACM, 2013.[12] \\Google AD Size." https://developers.google.com/admob/ios/banner.[13] V. Dave, S. Guha, and Y. Zhang, \\Measuring and Lngerprinting click-spam in adnetworks," in Proceedings of the ACM SIGCOMM 2012 conference on Applications,technologies, architectures, and protocols for computer communication, pp. 175{186,ACM, 2012.[14] T. Yeh, T.-H. Chang, and R. C. Miller, \\Sikuli: using gui screenshots for search andautomation," in Proceedings of the 22nd annual ACM symposium on User interfacesoftware and technology, pp. 183{192, ACM, 2009.[15] Apple, \\Apple Developer Documentation." https://developer.apple.com/documentation/, 2019.[16] P. Z. Ian Beer, \\A very deep dive into iOS Exploit chains foundin the wild." https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html, 2019.[17] W. Wang, I. L. Kim, and Y. Zheng, \\Adjust: runtime mitigation of resource abus-ing third-party online ads," in Proceedings of the 41st International Conference onSoftware Engineering, pp. 1005{1015, IEEE Press, 2019.[18] W. Yang, M. Prasad, and T. Xie, \\Enmobile: Entity-based characterization andanalysis of mobile malware," in 2018 IEEE/ACM 40th International Conference onSoftware Engineering (ICSE), pp. 384{394, IEEE, 2018.[19] P. Z. Ian Beer, \\In-the-wild iOS Exploit Chain 1." https://googleprojectzero.blogspot.com/2019/08/in-wild-ios-exploit-chain-1.html, 2019.[20] H.Wang and Y. Guo, \\Understanding third-party libraries in mobile app analysis," in2017 IEEE/ACM 39th International Conference on Software Engineering Companion(ICSE-C), pp. 515{516, IEEE, 2017.[21] D. M. Lazer, M. A. Baum, Y. Benkler, A. J. Berinsky, K. M. Greenhill, F. Menczer,M. J. Metzger, B. Nyhan, G. Pennycook, D. Rothschild, et al., \\The science of fakenews," Science, vol. 359, no. 6380, pp. 1094{1096, 2018.[22] A. Kantchelian, M. C. Tschantz, S. Afroz, B. Miller, V. Shankar, R. Bachwani, A. D.Joseph, and J. D. Tygar, \\Better malware ground truth: Techniques for weightinganti-virus vendor labels," in Proceedings of the 8th ACM Workshop on ArticialIntelligence and Security, pp. 45{56, ACM, 2015.[23] B. J. Kwon, J. Mondal, J. Jang, L. Bilge, and T. DumitraXs, \\The dropper effect:Insights into malware distribution with downloader graph analytics," in Proceedingsof the 22nd ACM SIGSAC Conference on Computer and Communications Security,pp. 1118{1129, ACM, 2015.[24] K. Chen, X. Wang, Y. Chen, P. Wang, Y. Lee, X. Wang, B. Ma, A. Wang, Y. Zhang,and W. Zou, \\Following devil`s footprints: Cross-platform analysis of potentiallyharmful libraries on android and ios," in 2016 IEEE Symposium on Security andPrivacy (SP), pp. 357{376, IEEE, 2016.[25] X. Liao, K. Yuan, X.Wang, Z. Pei, H. Yang, J. Chen, H. Duan, K. Du, E. Alowaisheq,S. Alrwais, et al., \\Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search," in 2016 IEEE Symposiumon Security and Privacy (SP), pp. 707{723, IEEE, 2016.[26] S. Roy, J. DeLoach, Y. Li, N. Herndon, D. Caragea, X. Ou, V. P. Ranganath, H. Li,and N. Guevara, \\Experimental study with real-world data for android app secu-rity analysis using machine learning," in Proceedings of the 31st Annual ComputerSecurity Applications Conference, pp. 81{90, ACM, 2015.[27] F. Wei, S. Roy, X. Ou, et al., \\Amandroid: a precise and general inter-componentdataow analysis framework for security vetting of android apps," ACM Transactionson Privacy and Security (TOPS), vol. 21, no. 3, p. 14, 2018.[28] H. Chen, H.-f. Leung, B. Han, and J. Su, \\Automatic privacy leakage detectionfor massive android apps via a novel hybrid approach," in 2017 IEEE InternationalConference on Communications (ICC), pp. 1{7, IEEE, 2017.[29] X. Pan, X. Wang, Y. Duan, X. Wang, and H. Yin, \\Dark hazard: Learning-based,large-scale discovery of hidden sensitive operations in android apps.," in NDSS, 2017.[30] A. Armando, G. Costa, A. Merlo, and L. Verderame, \\Enabling byod through securemeta-market," in Proceedings of the 2014 ACM conference on Security and privacyin wireless & mobile networks, pp. 219{230, ACM, 2014.[31] Y. Nan, M. Yang, Z. Yang, S. Zhou, G. Gu, and X. Wang, \\Uipicker: User-input pri-vacy identifcation in mobile applications," in 24th fUSENIXg Security Symposium(fUSENIXg Security 15), pp. 993{1008, 2015.[32] J. Huang, Z. Li, X. Xiao, Z. Wu, K. Lu, X. Zhang, and G. Jiang, \\fSUPORg: Preciseand scalable sensitive user input detection for android apps," in 24th fUSENIXgSecurity Symposium (fUSENIXg Security 15), pp. 977{992, 2015.[33] Z. Qu, V. Rastogi, X. Zhang, Y. Chen, T. Zhu, and Z. Chen, \\Autocog: Measur-ing the description-to-permission ldelity in android applications," in Proceedings ofthe 2014 ACM SIGSAC Conference on Computer and Communications Security,pp. 1354{1365, ACM, 2014.[34] R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, \\fWHYPERg: Towards au-tomating risk assessment of mobile applications," in Presented as part of the 22ndfUSENIXg Security Symposium (fUSENIXg Security 13), pp. 527{542, 2013.[35] P. Suciu, \\The Biggest Cybercrime Threats of 2019." https://www.ecommercetimes.com/story/85782.html, 2019.[36] A. Metwally, D. Agrawal, and A. El Abbadi, \\Detectives: detecting coalition hitination attacks in advertising networks streams," in Proceedings of the 16th inter-national conference on World Wide Web, pp. 241{250, ACM, 2007.[37] A. Metwally, F. Emekci, D. Agrawal, and A. El Abbadi, \\Sleuth: Single-publisherattack detection using correlation hunting," Proceedings of the VLDB Endowment,vol. 1, no. 2, pp. 1217{1228, 2008.[38] F. Yu, Y. Xie, and Q. Ke, \\Sbotminer: large scale search bot detection," in Pro-ceedings of the third ACM international conference on Web search and data mining,pp. 421{430, ACM, 2010.[39] S. A. Alrwais, A. Gerber, C. W. Dunn, O. Spatscheck, M. Gupta, and E. Osterweil,\\Dissecting ghost clicks: Ad fraud via misdirected human clicks," in Proceedings ofthe 28th Annual Computer Security Applications Conference, pp. 21{30, ACM, 2012.[40] T. Blizard and N. Livic, \\Click-fraud monetizing malware: A survey and case study,"in 2012 7th International Conference on Malicious and Unwanted Software, pp. 67{72, IEEE, 2012.[41] J. Crussell, R. Stevens, and H. Chen, \\Madfraud: Investigating ad fraud in androidapplications," in Proceedings of the 12th annual international conference on Mobilesystems, applications, and services, pp. 123{134, ACM, 2014.[42] X. Xiao, X. Wang, Z. Cao, H. Wang, and P. Gao, \\Iconintent: automatic identi-cation of sensitive ui widgets based on icon classication for android apps," in Pro-ceedings of the 41st International Conference on Software Engineering, pp. 257{268,IEEE Press, 2019.[43] P. Wang, D. Wu, Z. Chen, and T. Wei, \\Protecting million-user ios apps with ob-fuscation: motivations, pitfalls, and experience," in 2018 IEEE/ACM 40th Interna-tional Conference on Software Engineering: Software Engineering in Practice Track(ICSE-SEIP), pp. 235{244, IEEE, 2018.[44] A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, \\A survey of mobilemalware in the wild," in Proceedings of the 1st ACM Workshop on Security andPrivacy in Smartphones and Mobile Devices, SPSM `11, pp. 3{14, 2011.[45] S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. L. Traon,D. Octeau, and P. McDaniel, \\Flowdroid: precise context,ow, eld, object-sensitiveand lifecycle-aware taint analysis for android apps," in ACM SIGPLAN Conferenceon Programming Language Design and Implementation, PLDI `14, Edinburgh, UnitedKingdom - June 09 - 11, 2014, p. 29, 2014.[46] L. Li, T. F. Bissyande, D. Octeau, and J. Klein, \\Droidra: taming reection tosupport whole-program analysis of android apps," in Proceedings of the 25th Inter-national Symposium on Software Testing and Analysis, pp. 318{329, ACM, 2016.[47] W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. Mc-Daniel, and A. N. Sheth, \\Taintdroid: an information-ow tracking system for real-time privacy monitoring on smartphones," ACM Transactions on Computer Systems(TOCS), vol. 32, no. 2, p. 5, 2014.[48] T. Bao, J. Burket, M. Woo, R. Turner, and D. Brumley, \\Byteweight: Learning torecognize functions in binary code," in Proceedings of the 23rd USENIX Conferenceon Security Symposium, SEC`14, pp. 845{860, USENIX Association, 2014.[49] X. Meng and B. P. Miller, \\Binary code is not easy," in Proceedings of the 25thInternational Symposium on Software Testing and Analysis, ISSTA 2016, pp. 24{35,ACM, 2016.[50] Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino, A. Dutcher, J. Grosen,S. Feng, C. Hauser, C. Kruegel, et al., \\Sok:(state of) the art of war: Offensivetechniques in binary analysis," in 2016 IEEE Symposium on Security and Privacy(SP), pp. 138{157, IEEE, 2016.[51] T. Reinbacher and J. Brauer, \\Precise controlow reconstruction using booleanlogic," in Proceedings of the Ninth ACM International Conference on Embedded Soft-ware, EMSOFT `11, pp. 117{126, ACM, 2011.[52] D. Brumley, I. Jager, T. Avgerinos, and E. J. Schwartz, \\BAP: A binary analysisplatform," in Computer Aided Verication - 23rd International Conference, CAV2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings, pp. 463{469, 2011.[53] Dynist, \\Dynist: Tools for binary instrumentation, analysis, and modication."https://github.com/dyninst.[54] D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. New-some, P. Poosankam, and P. Saxena, \\Bitblaze: A new approach to computer securityvia binary analysis," in Proceedings of the 4th International Conference on Informa-tion Systems Security, ICISS `08, pp. 1{25, 2008.[55] Y. Lee, X. Wang, K. Lee, X. Liao, X. Wang, T. Li, and X. Mi, \\Understandingios-based crowdturng through hidden fUIg analysis," in 28th fUSENIXg SecuritySymposium (fUSENIXg Security 19), pp. 765{781, 2019.[56] C. Xiao, \\Pirated iOS App Stores Client Successfully Evaded Ap-ple iOS Code Review." https://unit42.paloaltonetworks.com/pirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/,2016.[57] N. Statt, \\This illicit iPhone app store has been hiding inplain sight." https://www.theverge.com/2019/2/20/18232140/apple-tutuapp-piracy-ios-apps-developer-enterprise-program-misuse,2019.[58] C.-H. Lin, F. Yu, J.-H. R. Jiang, and T. Bultan, \\Static detection of api call vulner-abilities in ios executables," in 2018 IEEE/ACM 40th International Conference onSoftware Engineering: Companion (ICSE-Companion), pp. 394{395, IEEE, 2018.[59] M. Egele, C. Kruegel, E. Kirda, and G. Vigna, \\Pios: Detecting privacy leaks in iosapplications.," in NDSS, 2011.[60] T.Werthmann, R. Hund, L. Davi, A.-R. Sadeghi, and T. Holz, \\Psios: bring your ownprivacy & security to ios devices," in Proceedings of the 8th ACM SIGSAC symposiumon Information, computer and communications security, pp. 13{24, ACM, 2013.[61] L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nurnberger,and A.-R. Sadeghi, \\Moc: A framework to mitigate control-ow attacks on smart-phones.," in NDSS, 2012.[62] Z. Deng, B. Saltaformaggio, X. Zhang, and D. Xu, \\iris: Vetting private api abuse inios applications," in Proceedings of the 22nd ACM SIGSAC Conference on Computerand Communications Security, pp. 44{56, ACM, 2015.[63] F. Yu, Y.-C. Lee, S. Tai, and W.-S. Tang, \\Appbeach: Characterizing app behaviorsvia static binary analysis," in Proceedings of the 2013 IEEE Second InternationalConference on Mobile Services, p. 86, IEEE Computer Society, 2013.[64] Z. R. Fang, S. W. Huang, and F. Yu, \\Appreco: Behavior-aware recommendation forios mobile applications," in 2016 IEEE International Conference on Web Services(ICWS), pp. 492{499, June 2016.[65] A. S. Christensen, A. Mller, and M. I. Schwartzbach, \\Precise analysis ofstring expressions," in Proc. 10th International Static Analysis Symposium (SAS),vol. 2694 of LNCS, pp. 1{18, Springer-Verlag, June 2003. Available fromhttp://www.brics.dk/JSA/.[66] C. Gould, Z. Su, and P. Devanbu, \\Static checking of dynamically generated queriesin database applications," in Software Engineering, 2004. ICSE 2004. Proceedings.26th International Conference on, pp. 645{654, IEEE, 2004.[67] P. A. Abdulla, M. F. Atig, Y.-F. Chen, L. Holk, A. Rezine, P. Rummer, and J. Sten-man, \\String constraints for verication," in International Conference on ComputerAided Verication, pp. 150{166, Springer, 2014.[68] A. Das, S. K. Lahiri, A. Lal, and Y. Li, \\Angelic verication: Precise vericationmodulo unknowns," in International Conference on Computer Aided Verication,pp. 324{342, Springer, 2015.[69] J. Schutte and D. Titze, \\lios: Lifting ios apps for fun and prot," 2019.[70] \\Hex-Rays Decompiler Manual." https://www.hex-rays.com/products/decompiler/manual/tricks.shtml.[71] J. Webber, \\A programmatic introduction to neo4j," in Proceedings of the 3rd an-nual conference on Systems, programming, and applications: software for humanity,pp. 217{218, ACM, 2012.[72] Facebook, \\Facebook Infer: Linters bug types-Unavailable api in supported iossdk ." https://fbinfer.com/docs/linters-bug-types.html#UNAVAILABLE_API_IN_SUPPORTED_IOS_SDK, 2019.[73] C. Calcagno, D. Distefano, J. Dubreil, D. Gabi, P. Hooimeijer, M. Luca, P. OHearn,I. Papakonstantinou, J. Purbrick, and D. Rodriguez, \\Moving fast with softwareverication," in NASA Formal Methods Symposium, pp. 3{11, Springer, 2015.[74] D. Distefano, P. W. Ohearn, and H. Yang, \\A local shape analysis based on separationlogic," in International Conference on Tools and Algorithms for the Construction andAnalysis of Systems, pp. 287{302, Springer, 2006.[75] C. Calcagno, D. Distefano, P. W. Ohearn, and H. Yang, \\Compositional shape anal-ysis by means of bi-abduction," Journal of the ACM (JACM), vol. 58, no. 6, p. 26,2011.[76] J. Berdine, C. Calcagno, and P. W. Ohearn, \\Smallfoot: Modular automatic assertionchecking with separation logic," in International Symposium on Formal Methods forComponents and Objects, pp. 115{137, Springer, 2005.[77] P. Cousot, \\Abstract interpretation in a nutshell," howpublished, 7th October, 2012.[78] Facebook, \\Facebook Infer: linters.al." https://github.com/facebook/infer/blob/472f155a7a1a5afa95f46d4300137e58cb1fa643/infer/lib/linter_rules/linters.al, 2019.[79] Facebook, \\Facebook Infer: cPredicates.ml." https://github.com/facebook/infer/blob/86140581d5e8690ac8ba82965aaa9d970acbb78e/infer/src/al/cPredicates.ml, 2019.[80] M. Pradel and K. Sen, \\Deepbugs: A learning approach to name-based bug detec-tion," Proceedings of the ACM on Programming Languages, vol. 2, no. OOPSLA,p. 147, 2018.[81] R. van Tonder and C. Le Goues, \\Static automated program repair for heap prop-erties," in 2018 IEEE/ACM 40th International Conference on Software Engineering(ICSE), pp. 151{162, IEEE, 2018.[82] M. Harman and P. O`Hearn, \\From start-ups to scale-ups: Opportunities and openproblems for static and dynamic program analysis," in 2018 IEEE 18th InternationalWorking Conference on Source Code Analysis and Manipulation (SCAM), pp. 1{23,IEEE, 2018.[83] N. Alshahwan, X. Gao, M. Harman, Y. Jia, K. Mao, A. Mols, T. Tei, and I. Zorin,\\Deploying search based software engineering with sapienz at facebook," in Interna-tional Symposium on Search Based Software Engineering, pp. 3{45, Springer, 2018.[84] Facebook, \\Facebook Infer: AL-examples." https://fbinfer.com/docs/linters.html#examples, 2019.[85] Apple, \\App Store Review Guidelines." https://developer.apple.com/app-store/review/guidelines, 2019.[86] ARM, \\ARM Information Center." http://infocenter.arm.com/help/index.jsp,2009.[87] soslab nccu, \\Github: Static Ad Fraud Detection on iOS Applications." https://github.com/soslab-nccu/detect-adfraud, 2019.[88] soslab nccu, \\Github: BinFlow-Static Detection of API Call Vulnerabilities in iOSExecutables." https://github.com/soslab-nccu/binflow, 2018.[89] C. Y. Huang, \\Video link of App 1077052682." https://drive.google.com/drive/folders/1ep4RiMFPcL4CbfY05ZGc11UMAYGqHkA3?usp=sharing, 2019. zh_TW dc.identifier.doi (DOI) 10.6814/NCCU202000021 en_US