Finding unknown malice in 10 seconds: mass vetting for new threats at the Google-play scale

作者: Heqing Huang , Yeonjoon Lee , Kai Chen , Peng Liu , Peng Wang

DOI:

关键词: ScalabilityStream processingProgram analysisWorld Wide WebComputer scienceVettingComputer securityCode reuseMalwareRepackagingRelation (database)

摘要: An app market's vetting process is expected to be scalable and effective. However, today's mechanisms are slow less capable of catching new threats. In our research, we found that a more powerful solution can by exploiting the way Android malware constructed disseminated, which typically through repackaging legitimate apps with similar malicious components. As result, such attack payloads often stand out from those same origin also show up in not supposed relate each other. Based upon this observation, developed technique, called MassVet, for at massive scale, without knowing what looks like how it behaves. Unlike existing detection mechanisms, utilize heavyweight program analysis techniques, approach simply compares submitted all already on market, focusing difference between sharing UI structure (indicating possible relation), commonality among seemingly unrelated. Once public libraries other code reuse removed, diff/common components become highly suspicious. built "Diff-Com" top an efficient similarity comparison algorithm, maps salient features app's or method's control-flow graph value fast comparison. We implemented MassVet over stream processing engine evaluated nearly 1.2 million 33 markets around world, scale Google Play. Our study shows technique vet within 10 seconds low false rate. Also, outperformed 54 scanners VirusTotal (NOD32, Symantec, McAfee, etc.) terms coverage, capturing hundred thousand apps, including 20 likely zero-day installed millions times. A close look these brings light intriguing observations e.g., Google's strategy authors' countermoves cause mysterious disappearance reappearance some Play apps.

参考文章(36)
Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis, AndRadar: Fast Discovery of Android Applications in Alternative Markets international conference on detection of intrusions and malware, and vulnerability assessment. pp. 51- 71 ,(2014) , 10.1007/978-3-319-08509-8_4
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Jonathan Crussell, Clint Gibler, Hao Chen, AnDarwin: Scalable Detection of Semantically Similar Android Applications european symposium on research in computer security. pp. 182- 199 ,(2013) , 10.1007/978-3-642-40203-6_11
Jonathan Crussell, Clint Gibler, Hao Chen, Attack of the Clones: Detecting Cloned Applications on Android Markets Computer Security – ESORICS 2012. pp. 37- 54 ,(2012) , 10.1007/978-3-642-33167-1_3
Fontbonne University. Public Safety Department, Annual Security Report Butler CC. ,(2014)
Min Zheng, Patrick P. C. Lee, John C. S. Lui, ADAM: an automatic and extensible platform to stress test android anti-virus systems international conference on detection of intrusions and malware and vulnerability assessment. pp. 82- 101 ,(2012) , 10.1007/978-3-642-37300-8_5
Andrew Walenstein, Arun Lakhotia, The Software Similarity Problem in Malware Analysis dagstuhl seminar proceedings. pp. 0- ,(2007)
Steve Hanna, Ling Huang, Edward Wu, Saung Li, Charles Chen, Dawn Song, Juxtapp: a scalable system for detecting code reuse among android applications international conference on detection of intrusions and malware and vulnerability assessment. pp. 62- 81 ,(2012) , 10.1007/978-3-642-37300-8_4
Kent Griffin, Scott Schneider, Xin Hu, Tzi-cker Chiueh, Automatic Generation of String Signatures for Malware Detection recent advances in intrusion detection. pp. 101- 120 ,(2009) , 10.1007/978-3-642-04342-0_6