NCScope: Hardware-Assisted Analyzer for Native Code in Android Apps

被引:7
|
作者
Zhou, Hao [1 ]
Wu, Shuohan [1 ]
Luo, Xiapu [1 ]
Wang, Ting [2 ]
Zhou, Yajin [3 ]
Zhang, Chao [4 ]
Cai, Haipeng [5 ]
机构
[1] Hong Kong Polytech Univ, Hong Kong, Peoples R China
[2] Penn State Univ, State Coll, PA USA
[3] Zhejiang Univ, Hangzhou, Zhejiang, Peoples R China
[4] Tsinghua Univ, BNRist, Beijing, Peoples R China
[5] Washington State Univ, Pullman, WA 99164 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Android; Dynamic Analysis; App Analysis;
D O I
10.1145/3533767.3534410
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
More and more Android apps implement their functionalities in native code, so does malware. Although various approaches have been designed to analyze the native code used by apps, they usually generate incomplete and biased results due to their limitations in obtaining and analyzing high-fidelity execution traces and memory data with low overheads. To fill the gap, in this paper, we propose and develop a novel hardware-assisted analyzer for native code in apps. We leverage ETM, a hardware feature of ARM platform, and eBPF, a kernel component of Android system, to collect real execution traces and relevant memory data of target apps, and design new methods to scrutinize native code according to the collected data. To show the unique capability of NCScope, we apply it to four applications that cannot be accomplished by existing tools, including systematic studies on self-protection and anti-analysis mechanisms implemented in native code of apps, analysis of memory corruption in native code, and identification of performance differences between functions in native code. The results uncover that only 26.8% of the analyzed financial apps implement self-protection methods in native code, implying that the security of financial apps is far from expected. Meanwhile, 78.3% of the malicious apps under analysis have anti-analysis behaviors, suggesting that NCScope is very useful to malware analysis. Moreover, NCScope can effectively detect bugs in native code and identify performance differences.
引用
收藏
页码:629 / 641
页数:13
相关论文
共 50 条
  • [1] Hardware-Assisted Monitoring for Code Security in Embedded System
    Wang, Xiang
    Shen, Quanneng
    Du, Pei
    Zhang, Rong
    Wang, Weike
    Li, Lin
    Xu, Bin
    Ji, Huihui
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1393 - 1396
  • [2] Native Simulation of MPSoC Using Hardware-Assisted Virtualization
    Shen, Hao
    Hamayun, Mian-Muhammad
    Petrot, Frederic
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2012, 31 (07) : 1074 - 1087
  • [3] Hardware-Assisted Code Obfuscation for FPGA Soft Microprocessors
    Kainth, Meha
    Krishnan, Lekshmi
    Narayana, Chaitra
    Virupaksha, Sandesh Gubbi
    Tessier, Russell
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 127 - 132
  • [4] CRAlert: Hardware-Assisted Code Reuse Attack Detection
    Wang, Wenhao
    Hu, Guangyu
    Xu, Xiaolin
    Zhang, Jiliang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (03) : 1607 - 1611
  • [5] Protecting Android Apps from Repackaging Using Native Code
    Tanner, Simon
    Vogels, Ilian
    Wattenhofer, Roger
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 189 - 204
  • [6] Protecting Android Apps Against Reverse Engineering by the Use of the Native Code
    Protsenko, Mykola
    Mueller, Tilo
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 99 - 110
  • [7] Hardware-assisted fast routing
    DeHon, A
    Huang, R
    Wawrzynek, J
    10TH ANNUAL IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2002, : 205 - 215
  • [8] HARDWARE-ASSISTED POLYGON ANTIALIASING
    BARKANS, AC
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 1991, 11 (01) : 80 - 88
  • [9] Hardware-Assisted Projected Tetrahedra
    Maximo, A.
    Marroquim, R.
    Farias, R.
    COMPUTER GRAPHICS FORUM, 2010, 29 (03) : 903 - 912
  • [10] Hardware-assisted fine-grained code-reuse attack detection
    20155201716533
    (1) State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China; (2) Department of Computer Science and Technology, Nanjing University, Nanjing, China; (3) School of Information Systems, Singapore Management University, Singapore, Singapore, 1600, Asterisk Research, Inc.; Deloitte Tohmatsu Risk Services Co., Ltd.; Farsight Security, Inc.; NTT Communications Corporation; Tapad Inc. (Springer Verlag):