Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models

被引:25
|
作者
Junaid, Mohsin [1 ]
Liu, Donggang [1 ]
Kung, David [1 ]
机构
[1] Univ Texas Arlington, Dept Comp Sci & Engn, Arlington, TX 76019 USA
关键词
Static analysis; Mobile app security; Android; Malware; Privacy; Life cycle models;
D O I
10.1016/j.cose.2016.01.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The amount of Android malware has increased greatly during the last few years. Static analysis is widely used in detecting such malware by analyzing the code without execution. The effectiveness of current tools relies on the app model as well as the malware detection algorithm which analyzes the app model. If the model and/or the algorithm is inadequate, then sophisticated attacks that are triggered by specific sequences of events will not be detected. This paper presents a static analysis framework called Dexteroid, which uses reverse engineered life cycle models to accurately capture the behaviors of Android components. Dexteroid systematically derives event sequences from the models, and uses them to detect attacks launched by specific ordering of events. A prototype implementation of Dexteroid detects two types of attacks: (1) leakage of private information, and (2) sending SMS to premium-rate numbers. A series of experiments are conducted on 1526 Google Play apps, 1259 Genome Malware apps, and a suite of benchmark apps called DroidBench and the results are compared with a state-of-the-art static analysis tool called FlowDroid. The evaluation results show that the proposed framework is effective and efficient in terms of precision, recall, and execution time. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:92 / 117
页数:26
相关论文
共 4 条
  • [1] Detecting Malicious Android Apps using the Popularity and Relations of APIs
    Jung, Jaemin
    Lim, Kyeonghwan
    Kim, Byoungchul
    Cho, Seong-je
    Han, Sangchul
    Suh, Kyoungwon
    [J]. 2019 IEEE SECOND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE), 2019, : 309 - 312
  • [2] Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme
    Zhang, Lulu
    Zhang, Yongzheng
    Zang, Tianning
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 454 - 462
  • [3] Finding Errors from Reverse-Engineered Equality Models using a Constraint Solver
    Rupakheti, Chandan R.
    Hou, Daqing
    [J]. 2012 28TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE (ICSM), 2012, : 77 - 86
  • [4] Shear behaviors of engineered cementitious composites to seawater sea-sand concrete (ECC-to-SSSC) interfaces cast using 3D-printed pre-grooving formwork: Mechanical properties, characterization, and life-cycle assessment
    Wu, Xiaowei
    He, Jingwen
    Tian, Jun
    Tan, Xiao
    Hu, Shaowei
    Zheng, Yu
    Wang, Wen-Wei
    Zhang, Weiguo
    [J]. JOURNAL OF BUILDING ENGINEERING, 2023, 78