Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation

MAIORCA, DAVIDE;GIACINTO, GIORGIO;
2016-01-01

Abstract

The recent past has shown that Android smartphones became the most popular target for malware authors. Malware families offer a variety of features that allow, among the others, to steal arbitrary data and to cause significant monetary losses. This circumstances led to the development of many different analysis methods that are aimed to assess the absence of potential harm or malicious behavior in mobile apps. In return, malware authors devised more sophisticated methods to write mobile malware that attempt to thwart such analyses. In this work, we briefly describe assumptions analysis tools rely on to detect malicious content and behavior. We then present results of a new obfuscation framework that aims to break such assumptions, thus modifying Android apps to avoid them being analyzed by the targeted systems. We use our framework to evaluate the robustness of static and dynamic analysis systems for Android apps against such transformations.
2016
Inglese
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy
9781450339353
ACM
New York
STATI UNITI D'AMERICA
139
141
3
Sixth ACM on Conference on Data and Application Security and Privacy
Esperti anonimi
March 9-11, 2016
New Orleans
internazionale
scientifica
4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno
Hoffmann, J; Rytilahti, T; Maiorca, Davide; Winandy, M; Giacinto, Giorgio; Holz, T.
273
6
reserved
info:eu-repo/semantics/conferencePaper
File in questo prodotto:
File Dimensione Formato  
p139-hoffmann.pdf

Solo gestori archivio

Tipologia: versione editoriale
Dimensione 726.65 kB
Formato Adobe PDF
726.65 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Questionario e social

Condividi su:
Impostazioni cookie