%0 Conference Proceedings %T Code Between the Lines: Semantic Analysis of Android Applications %+ Institute of Applied Information Processing and Communications [Graz] (IAIK) %+ Secure Information Technology Center (A-SIT) %A Feichtner, Johannes %A Gruber, Stefan %Z Part 4: Detecting Malware and Software Weaknesses %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC) %C Maribor, Slovenia %Y Marko Hölbl %Y Kai Rannenberg %Y Tatjana Welzer %I Springer International Publishing %3 ICT Systems Security and Privacy Protection %V AICT-580 %P 171-186 %8 2020-09-21 %D 2020 %R 10.1007/978-3-030-58201-2_12 %Z Computer Science [cs]Conference papers %X Static and dynamic program analysis are the key concepts researchers apply to uncover security-critical implementation weaknesses in Android applications. As it is often not obvious in which context problematic statements occur, it is challenging to assess their practical impact. While some flaws may turn out to be bad practice but not undermine the overall security level, others could have a serious impact. Distinguishing them requires knowledge of the designated app purpose.In this paper, we introduce a machine learning-based system that is capable of generating natural language text describing the purpose and core functionality of Android apps based on their actual code. We design a dense neural network that captures the semantic relationships of resource identifiers, string constants, and API calls contained in apps to derive a high-level picture of implemented program behavior. For arbitrary applications, our system can predict precise, human-readable keywords and short phrases that indicate the main use-cases apps are designed for.We evaluate our solution on 67,040 real-world apps and find that with a precision between 69% and 84% we can identify keywords that also occur in the developer-provided description in Google Play. To avoid incomprehensible black box predictions, we apply a model explaining algorithm and demonstrate that our technique can substantially augment inspections of Android apps by contributing contextual information. %G English %Z TC 11 %2 https://inria.hal.science/hal-03440841/document %2 https://inria.hal.science/hal-03440841/file/497034_1_En_12_Chapter.pdf %L hal-03440841 %U https://inria.hal.science/hal-03440841 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-SEC %~ IFIP-AICT-580