Structural analysis of packing schemes for extracting hidden codes in mobile malware

被引:11
|
作者
Lim, Jongsu [1 ]
Yi, Jeong Hyun [1 ]
机构
[1] Soongsil Univ, Dept Software, 369 Sangdo Ro, Seoul 06978, South Korea
基金
新加坡国家研究基金会;
关键词
Repackaging attack; Android app security; Mobile code hiding;
D O I
10.1186/s13638-016-0720-3
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the Internet of Things service environment where all things are connected, mobile devices will become an extremely important medium linking together things with built-in heterogeneous communication functions. If a mobile device is exposed to hacking in this context, a security threat arises where all things linked to the device become targets of cyber hacking; therefore, greater emphasis will be placed on the demand for swift mobile malware detection and countermeasures. Such mobile malware applies advanced code-hiding schemes to ensure that the part of the code that executes malicious behavior is not detected by an anti-virus software. In order to detect mobile malware, we must first conduct structural analysis of their code-hiding schemes. In this paper, we analyze the structure of the two representative Android-based code-hiding tools, Bangcle and DexProtector, and then introduce a method and procedure for extracting the hidden original code. We also present experimental results of applying these tools on sample malicious codes.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [41] Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
    Yeong Tyng Ling
    Nor Fazlida Mohd Sani
    Mohd Taufik Abdullah
    Nor Asilah Wati Abdul Hamid
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 183 - 203
  • [42] Behavior-based Malware Analysis using Profile Hidden Markov Models
    Ravi, Saradha
    Balakrishnan, N.
    Venkatesh, Bharath
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 195 - 206
  • [43] Malware Pattern Scanning Schemes Secure Against Black-box Analysis
    Eric Filiol
    Journal in Computer Virology, 2006, 2 (1): : 35 - 50
  • [44] Malware pattern scanning schemes secure against black-box analysis
    Filiol, Eric
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 35 - 50
  • [45] Mobile VPN Schemes: Technical Analysis and Experiments
    Ahmat, Daouda
    Barka, Mahamat
    Magoni, Damien
    E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2016), 2018, 208 : 88 - 97
  • [46] STRUCTURAL-ANALYSIS OF CONVOLUTIONAL CODES VIA DUAL CODES
    FORNEY, GD
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1973, 19 (04) : 512 - 518
  • [47] ENGINEERING CODES FOR THE ANALYSIS OF STRUCTURAL INTEGRITY
    HARRIS, DO
    WELLS, CH
    RAU, SA
    DEDHIA, DD
    INTERNATIONAL JOURNAL OF PRESSURE VESSELS AND PIPING, 1994, 59 (1-3) : 175 - 183
  • [48] Automated extracting structural roads from mobile laser scanning point clouds
    Fang, L. (lina.fang@whu.edu.cn), 1600, SinoMaps Press (42):
  • [49] Performance analysis of call assignment and carrier packing schemes for TDMA systems
    Sampath, A
    Kaufman, JS
    Kodialam, MS
    Budka, KC
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2003, 52 (06) : 1540 - 1557
  • [50] ANALYSIS OF STEPSIZE SELECTION SCHEMES FOR RUNGE-KUTTA CODES
    HALL, G
    HIGHAM, DJ
    IMA JOURNAL OF NUMERICAL ANALYSIS, 1988, 8 (03) : 305 - 310