Boffins build automated Android bug hunting system
Briefly

Boffins build automated Android bug hunting system
"The authors claim that the A2 system achieves 78.3 percent coverage on the Ghera benchmark, surpassing static analyzers like APKHunt (30.0 percent). And they say that, when they used A2 on 169 production APKs, they found "104 true-positive zero-day vulnerabilities," 57 of which were self-validated via automatically generated proof-of-concept (PoC) exploits. One of these included a medium-severity flaw in an Android app with over 10 million installs."
""We discovered an intent redirect issue," said Liyi Zhou, a lecturer in computer science at The University of Sydney, in an email to The Register. "This is not a trivial bug, and it shows A2's ability to uncover real, impactful flaws in the wild." An intent redirect, he explained, happens when an Android app sends an intent - a message used to request an action, like opening a screen or passing data - but fails to check carefully where it is going."
A2 emulates human bug hunters to discover and validate vulnerabilities in Android apps. A2 extends prior AI exploit work to perform both discovery and automatic validation in mobile applications. A2 achieved 78.3 percent coverage on the Ghera benchmark, outperforming static analyzers such as APKHunt (30.0 percent). On 169 production APKs, A2 found 104 true-positive zero-day vulnerabilities, with 57 self-validated via automatically generated proof-of-concept exploits. One notable finding was a medium-severity intent redirect in an app with over 10 million installs. Intent redirects allow malicious apps to reroute intents when destination checks fail.
Read at Theregister
Unable to calculate read time
[
|
]