ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications
We propose a system, named ATVHunter, which can pinpoint the precise
vulnerable in-app TPL versions and provide detailed information about the
vulnerabilities and TPLs. We propose a two-phase detection approach to identify
specific TPL versions. Specifically, we extract the Control Flow Graphs as the
coarse-grained feature to match potential TPLs in the pre-defined TPL database,
and then extract opcode in each basic block of CFG as the fine-grained feature
to identify the exact TPL versions. We build a comprehensive TPL database
(189,545 unique TPLs with 3,006,676 versions) as the reference database.
Meanwhile, to identify the vulnerable in-app TPL versions, we also construct a
comprehensive and known vulnerable TPL database containing 1,180 CVE