Argus: Detecting Access Control Vulnerabilities in Android Framework using Large Language Models

dc.contributor.authorFaheem, Haseeb Ur Rehman
dc.date.accessioned2025-08-25T13:40:18Z
dc.date.available2025-08-25T13:40:18Z
dc.date.issued2025-08-25
dc.date.submitted2025-08-18
dc.description.abstractAccess control (AC) inconsistencies in Android’s framework APIs are a persistent security challenge, especially in customized ROMs. While convergence-based and probabilistic tools have made progress in detecting these inconsistencies, they suffer from either high false positive rates or limited coverage due to reliance on domain-knowledge and manually defined inference rule. Large Language Model (LLMs) offer promise but tend to overprotect APIs when operating without sufficient Android specific context. In this work, we present Argus, a novel hybrid LLM-driven pipeline that combines static code analysis, code embeddings, and context-aware prompting to improve AC recommendations for Android APIs. Argus begins by extracting path-sensitive summarized program paths from decompiled ROMs and uses rule-based prompting to guide LLMs in identifying focal functionality (i.e., security-relevant sinks). These sinks, along with their known AC, are embedded and stored in a code embedding. Given a target API, Argus ’s retrieval system queries this database to identify similar functionalities with known AC levels. These aligned examples are then incorporated into a second, detailed prompt that instructs the LLM to consider relevance, sensitivity rankings, and Android-specific context; enabling precise, context-aware AC recommendations. We evaluate Argus on five custom ROMs and demonstrate its effectiveness in uncovering previously undocumented AC vulnerabilities. Among these are unauthorized camera parameter modification and spoofing of system crash reports (Vivo Y33s), exposure of SIM lock state (Vivo Y33s), unprotected refresh rate customization and retrieval of all package names (OnePlus 12), and unrestricted access to Wi-Fi hotspot management APIs, such as setting client blocklists (Infinix Smart 8). Several findings have been acknowledged by vendors, highlighting Argus ’s practical impact.
dc.identifier.urihttps://hdl.handle.net/10012/22243
dc.language.isoen
dc.pendingfalse
dc.publisherUniversity of Waterlooen
dc.titleArgus: Detecting Access Control Vulnerabilities in Android Framework using Large Language Models
dc.typeMaster Thesis
uws-etd.degreeMaster of Mathematics
uws-etd.degree.departmentDavid R. Cheriton School of Computer Science
uws-etd.degree.disciplineComputer Science
uws-etd.degree.grantorUniversity of Waterlooen
uws-etd.embargo.terms1 year
uws.contributor.advisorAafer, Yousra
uws.contributor.affiliation1Faculty of Mathematics
uws.peerReviewStatusUnrevieweden
uws.published.cityWaterlooen
uws.published.countryCanadaen
uws.published.provinceOntarioen
uws.scholarLevelGraduateen
uws.typeOfResourceTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Faheem_Haseeb-Ur-Rehman.pdf
Size:
523.63 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
6.4 KB
Format:
Item-specific license agreed upon to submission
Description: