Static Analysis of JNI Programs via Binary Decompilation

Cited 1 time in webofscience Cited 0 time in scopus
  • Hit : 103
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorPark, Jiheeko
dc.contributor.authorLee, Sunghoko
dc.contributor.authorHong, Jaeminko
dc.contributor.authorRyu, Sukyoungko
dc.date.accessioned2023-07-04T03:01:42Z-
dc.date.available2023-07-04T03:01:42Z-
dc.date.created2023-07-03-
dc.date.created2023-07-03-
dc.date.issued2023-05-
dc.identifier.citationIEEE TRANSACTIONS ON SOFTWARE ENGINEERING, v.49, no.5, pp.3089 - 3105-
dc.identifier.issn0098-5589-
dc.identifier.urihttp://hdl.handle.net/10203/310258-
dc.description.abstractJNI programs are widely used thanks to the combined benefits of C and Java programs. However, because understanding the interaction behaviors between two different programming languages is challenging, JNI program development is difficult to get right and vulnerable to security attacks. Thus, researchers have proposed static analysis of JNI program source code to detect bugs and security vulnerabilities in JNI programs. Unfortunately, such source code analysis is not applicable to compiled JNI programs that are not open-sourced or open-source JNI programs containing third-party binary libraries. While JN-SAF, the state-of-the-art analyzer for compiled JNI programs, can analyze binary code, it has several limitations due to its symbolic execution and summary-based bottom-up analysis. In this paper, we propose a novel approach to statically analyze compiled JNI programs without their source code using binary decompilation. Unlike JN-SAF that analyzes binaries directly, our approach decompiles binaries and analyzes JNI programs with the decompiled binaries using an existing JNI program analyzer for source code. To decompile binaries to compilable C source code with precise JNI-interoperation-related types, we improve an existing decompilation tool by leveraging the characteristics of JNI programs. Our evaluation shows that the approach is precise as almost the same as the state-of-the-art JNI program analyzer for source code, and more precise than JN-SAF.-
dc.languageEnglish-
dc.publisherIEEE COMPUTER SOC-
dc.titleStatic Analysis of JNI Programs via Binary Decompilation-
dc.typeArticle-
dc.identifier.wosid000991628700004-
dc.identifier.scopusid2-s2.0-85148475131-
dc.type.rimsART-
dc.citation.volume49-
dc.citation.issue5-
dc.citation.beginningpage3089-
dc.citation.endingpage3105-
dc.citation.publicationnameIEEE TRANSACTIONS ON SOFTWARE ENGINEERING-
dc.identifier.doi10.1109/TSE.2023.3241639-
dc.contributor.localauthorRyu, Sukyoung-
dc.contributor.nonIdAuthorLee, Sungho-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorJava-
dc.subject.keywordAuthorCodes-
dc.subject.keywordAuthorSource coding-
dc.subject.keywordAuthorStatic analysis-
dc.subject.keywordAuthorLibraries-
dc.subject.keywordAuthorComputer architecture-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorJava native interface-
dc.subject.keywordAuthorbinary decompilation-
dc.subject.keywordAuthorstatic analysis-
dc.subject.keywordPlusJAVA-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 1 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0