Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation

作者: Parvez Faruki , Ammar Bharmal , Vijay Laxmi , M.S. Gaur , Mauro Conti

DOI: 10.1109/TRUSTCOM.2014.54

关键词:

摘要: Popularity and growth of Android mobile devices has paved the way for exploiting popular apps using various Dalvik byte code transformation methods. Testing antimalware techniques against obfuscation identifies need proposing effective detection In this paper, we explore resilience anti-malware transformations Android. The Proposed approach employs variable compression, native wrapping register renaming, in addition to already implemented on code. Evaluation results indicate low engines obfuscation. Furthermore, evaluate Androguard's similarity AndroSimilar's robust statistical feature signature obfuscated malware.

参考文章(16)
Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez, Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models european symposium on research in computer security. ,vol. 8712, pp. 183- 201 ,(2014) , 10.1007/978-3-319-11203-9_11
Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu, A Framework for Evaluating Mobile App Repackaging Detection Algorithms Trust and Trustworthy Computing. pp. 169- 186 ,(2013) , 10.1007/978-3-642-38908-5_13
Glenford J. Myers, Art of Software Testing John Wiley & Sons, Inc.. ,(1979)
Min Zheng, Patrick P. C. Lee, John C. S. Lui, ADAM: an automatic and extensible platform to stress test android anti-virus systems international conference on detection of intrusions and malware and vulnerability assessment. pp. 82- 101 ,(2012) , 10.1007/978-3-642-37300-8_5
Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki, Smita Naval, PEAL--Packed executable analysis international conference on advanced computing. pp. 237- 243 ,(2011) , 10.1007/978-3-642-29280-4_28
Mihai Christodorescu, Somesh Jha, Testing malware detectors international symposium on software testing and analysis. ,vol. 29, pp. 34- 44 ,(2004) , 10.1145/1007512.1007518
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning, Detecting repackaged smartphone applications in third-party android marketplaces Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12. pp. 317- 326 ,(2012) , 10.1145/2133601.2133640
Damien Octeau, Somesh Jha, Patrick McDaniel, Retargeting Android applications to Java bytecode Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering - FSE '12. pp. 6- ,(2012) , 10.1145/2393596.2393600
Dimitrios Damopoulos, Georgios Kambourakis, Georgios Portokalidis, The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones european workshop on system security. pp. 6- ,(2014) , 10.1145/2592791.2592797