Facebook Open-sources Tool To Find Android App Security Flaws
Facebook today open-sourced a static analysis tool its software and security engineers use internally to find potentially dangerous security and privacy flaws in the company’s Android and Java applications.
This security-focused tool, dubbed Mariana Trench (MT), can analyze large codebases of tens of millions of lines of code to spot vulnerabilities before they’re introduced in the codebase.
Facebook revealed that its engineers found more than 50% of all security bugs across the company’s apps using automated tools similar to Mariana Trench.
Also Read: Vulnerability Management For Cybersecurity Dummies
How it works
Mariana Trench works by analyzing the information flow from “sources” (user sensitive data such as passwords or locations) to “sinks” (functions or methods using data originating from sources).
Mariana Trench is specifically designed to automatically discover such issues, which, in most cases, could lead to severe privacy and security bugs.
“By default Mariana Trench analyzes dalvik bytecode and can work with or without access to the source code,” Facebook explains on the tool’s documentation website.
“A flow from sources to sinks indicate that for example user passwords may get logged into a file, which is not desirable and is called as an ‘issue’ under the context of Mariana Trench,” Facebook Software Engineer Dominik Gabi said.
Also Read: Compliance With Singapore Privacy Obligations; Made Easier!
Developers and engineers can use the tool to focus on specific security and privacy issues by adjusting and training it by adding new rules and model generators so that it homes in on the areas sensitive data shouldn’t end up.
Third code analysis tool open-sourced since 2019
The company previously released two other static code analysis tools designed to detect and prevent security issues for Python code (Pysa) and Hack code (Zoncolan).
You can find the Mariana Trench code analysis tool on GitHub and its own dedicated website, a binary distribution on PyPI, and a short tutorial to help get started.
‘We built MT to focus particularly on Android applications. There are differences in patching and ensuring the adoption of code updates between mobile and web applications, so they require different approaches,” Gabi added.
“While server-side code can be updated almost instantaneously for web apps, mitigating a security bug in an Android application relies on each user updating the application on the device they own in a timely way.
“This makes it that much more important for any app developer to put systems in place to help prevent vulnerabilities from making it into mobile releases, whenever possible.”
0 Comments