Stealth attacks: An extended insight into the obfuscation effects on Android malware

被引:104
|
作者
Maiorca, Davide [1 ]
Ariu, Davide [1 ]
Corona, Igino [1 ]
Aresu, Marco [1 ]
Giacinto, Giorgio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
Android; Malware; Obfuscation; Evasion; DexGuard; Dalvik; Entry points; Signatures; Strings; Bytecode;
D O I
10.1016/j.cose.2015.02.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to effectively evade anti-malware solutions, Android malware authors are progressively resorting to automatic obfuscation strategies. Recent works have shown, on small-scale experiments, the possibility of evading anti-malware engines by applying simple obfuscation transformations on previously detected malware samples. In this paper, we provide a large-scale experiment in which the detection performances of a high number of anti-malware solutions are tested against two different sets of malware samples that have been obfuscated according to different strategies. Moreover, we show that anti-malware engines search for possible malicious content inside assets and entry-point classes. We also provide a temporal analysis of the detection performances of anti-malware engines to verify if their resilience has improved since 2013. Finally, we show how, by manipulating the area of the Android executable that contains the strings used by the application, it is possible to deceive anti-malware engines so that they will identify legitimate samples as malware. On one hand, the attained results show that anti-malware systems have improved their resilience against trivial obfuscation techniques. On the other hand, more complex changes to the application executable have proved to be still effective against detection. Thus, we claim that a deeper static (or dynamic) analysis of the application is needed to improve the robustness of such systems. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:16 / 31
页数:16
相关论文
共 50 条
  • [1] Python']Python and Malware: Developing Stealth and Evasive Malware without Obfuscation
    Koutsokostas, Vasilios
    Patsakis, Constantinos
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 125 - 136
  • [2] BLADE: Robust malware detection against obfuscation in android
    Sihag, Vikas
    Vardhan, Manu
    Singh, Pradeep
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 38
  • [3] Effectiveness of Android Obfuscation on Evading Anti-malware
    Chua, Melissa
    Balachandran, Vivek
    [J]. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 143 - 145
  • [4] BLADE: Robust malware detection against obfuscation in android
    Sihag, Vikas
    Vardhan, Manu
    Singh, Pradeep
    [J]. Forensic Science International: Digital Investigation, 2021, 38
  • [5] Obfusifier: Obfuscation-Resistant Android Malware Detection System
    Li, Zhiqiang
    Sun, Jun
    Yan, Qiben
    Srisa-an, Witawas
    Tsutano, Yutaka
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 214 - 234
  • [6] Evaluation of Android Anti Malware Techniques against Dalvik Bytecode Obfuscation
    Faruki, Parvez
    Bharmal, Ammar
    Laxmi, Vijay
    Gaur, M. S.
    Conti, Mauro
    Rajarajan, Muttukrishnan
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 414 - 421
  • [7] Lightweight versus obfuscation-resilient malware detection in android applications
    Aghamohammadi, Ali
    Faghih, Fathiyeh
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (02) : 125 - 139
  • [8] Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware
    Garcia, Joshua
    Hammad, Mahmoud
    Malek, Sam
    [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 497 - 497
  • [9] Lightweight versus obfuscation-resilient malware detection in android applications
    Ali Aghamohammadi
    Fathiyeh Faghih
    [J]. Journal of Computer Virology and Hacking Techniques, 2020, 16 : 125 - 139
  • [10] AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning
    Jiang, Yu
    Li, Ruixuan
    Tang, Junwei
    Davanian, Ali
    Yin, Heng
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 242 - 253