Structural analysis of packing schemes for extracting hidden codes in mobile malware

被引:11
|
作者
Lim, Jongsu [1 ]
Yi, Jeong Hyun [1 ]
机构
[1] Soongsil Univ, Dept Software, 369 Sangdo Ro, Seoul 06978, South Korea
基金
新加坡国家研究基金会;
关键词
Repackaging attack; Android app security; Mobile code hiding;
D O I
10.1186/s13638-016-0720-3
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the Internet of Things service environment where all things are connected, mobile devices will become an extremely important medium linking together things with built-in heterogeneous communication functions. If a mobile device is exposed to hacking in this context, a security threat arises where all things linked to the device become targets of cyber hacking; therefore, greater emphasis will be placed on the demand for swift mobile malware detection and countermeasures. Such mobile malware applies advanced code-hiding schemes to ensure that the part of the code that executes malicious behavior is not detected by an anti-virus software. In order to detect mobile malware, we must first conduct structural analysis of their code-hiding schemes. In this paper, we analyze the structure of the two representative Android-based code-hiding tools, Bangcle and DexProtector, and then introduce a method and procedure for extracting the hidden original code. We also present experimental results of applying these tools on sample malicious codes.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [21] A Behavior Analysis Based Mobile Malware Defense System
    Guo, Dai Fei
    Sui, Ai-Fen
    Guo, Tao
    6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS'2012), 2012,
  • [22] Mobile Malware Detection - An Analysis of the Impact of Feature Categories
    Khoda, Mahbub E.
    Kamruzzaman, Joarder
    Gondal, Iqbal
    Imam, Tasadduq
    NEURAL INFORMATION PROCESSING (ICONIP 2018), PT IV, 2018, 11304 : 486 - 498
  • [23] iOS mobile malware analysis: a state-of-the-art
    Saudi, Madihah Mohd
    Husainiamer, Muhammad Afif
    Ahmad, Azuan
    Idris, Mohd Yamani Idna
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (04) : 533 - 562
  • [24] Survey of Mobile Malware Analysis, Detection Techniques and Tool
    Gyamfi, Nana Kwame
    Owusu, Ebenezer
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1101 - 1106
  • [25] Mobile Malware Detection: An Analysis of Deep Learning Model
    Khoda, Mahbub E.
    Kamruzzaman, Joarder
    Gondal, Iqbal
    Imam, Tasadduq
    Rahman, Ashfaqur
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1161 - 1166
  • [26] Further Experiments in Biocomputational Structural Analysis of Malware
    Naidu, Vijay
    Narayanan, Ajit
    2014 10TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2014, : 605 - 610
  • [27] Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence
    Caviglione, Luca
    Gaggero, Mauro
    Lalande, Jean-Francois
    Mazurczyk, Wojciech
    Urbanski, Marcin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 799 - 810
  • [28] Using Hidden Markov Model for Dynamic Malware Analysis: First Impressions
    Imran, Mohammad
    Afzal, Muhammad Tanvir
    Qadir, Muhammad Abdul
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 816 - 821
  • [29] Topological Data Analysis for Extracting Hidden Features of Client Data
    Schebesch, Klaus B.
    Stecking, Ralf W.
    OPERATIONS RESEARCH PROCEEDINGS 2015, 2017, : 483 - 489
  • [30] Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information
    ZHANG Wei-ming 1
    2.State Key Laboratory of Information Security
    WuhanUniversityJournalofNaturalSciences, 2005, (01) : 315 - 318