How Current Android Malware Seeks to Evade Automated Code Analysis

作者: Siegfried Rasthofer , Irfan Asrar , Stephan Huber , Eric Bodden

DOI: 10.1007/978-3-319-24018-3_12

关键词:

摘要: First we report on a new threat campaign, underway in Korea, which infected around 20,000 Android users within two months. The campaign attacked mobile with malicious applications spread via different channels, such as email attachments or SMS spam. A detailed investigation of the malware resulted identification family Android/BadAccents. represents current state-of-the-art development for banking trojans. Second, describe detail techniques this uses and confront them static dynamic code-analysis applications. We highlight various challenges automatic analysis frameworks that significantly hinder fully detection components malware. Furthermore, exploits previously unknown tapjacking vulnerability operating system, describe. As result work, vulnerability, affecting all versions, will be patched one next releases Open Source Project.

参考文章(31)
Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi, Christian Platzer, Stefano Zanero, Sotiris Ioannidis, AndRadar: Fast Discovery of Android Applications in Alternative Markets international conference on detection of intrusions and malware, and vulnerability assessment. pp. 51- 71 ,(2014) , 10.1007/978-3-319-08509-8_4
Tim Strazzere, Manu Quintans, Shane Hartman, Jose Andre Morales, Ken Dunham, Android Malware and Analysis ,(2014)
Siegfried Rasthofer, Steven Arzt, Max Kolhagen, Brian Pfretzschner, Stephan Huber, Eric Bodden, Philipp Richter, DroidSearch: A tool for scaling Android app triage to real-world app stores science and information conference. pp. 247- 256 ,(2015) , 10.1109/SAI.2015.7237151
Damien Octeau, Yves Le Traon, Eric Bodden, Alexandre Bartel, Patrick McDaniel, Jacques Klein, Somesh Jha, Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis usenix security symposium. pp. 543- 558 ,(2013)
Konrad Rieck, Philipp Trinius, Carsten Willems, Thorsten Holz, Automatic analysis of malware behavior using machine learning Journal of Computer Security. ,vol. 19, pp. 639- 668 ,(2011) , 10.3233/JCS-2010-0410
David Basin, Sebastian Mödersheim, Luca Vigano, None, An on-the-fly model-checker for security protocol analysis european symposium on research in computer security. pp. 253- 270 ,(2003) , 10.1007/978-3-540-39650-5_15
Johannes Hoffmann, Martin Ussath, Thorsten Holz, Michael Spreitzenbarth, Slicing droids: program slicing for smali code acm symposium on applied computing. pp. 1844- 1851 ,(2013) , 10.1145/2480362.2480706
Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, X. Sean Wang, Binyu Zang, Vetting undesirable behaviors in android apps with permission use analysis computer and communications security. pp. 611- 622 ,(2013) , 10.1145/2508859.2516689
Raimondas Sasnauskas, John Regehr, Intent fuzzer: crafting intents of death international workshop on dynamic analysis. pp. 1- 5 ,(2014) , 10.1145/2632168.2632169
Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, Sahin Albayrak, An Android Application Sandbox system for suspicious software detection international conference on malicious and unwanted software. pp. 55- 62 ,(2010) , 10.1109/MALWARE.2010.5665792