The rise of obfuscated Android malware and impacts on detection methods

被引:14
|
作者
Elsersy, Wael F. [1 ]
Feizollah, Ali [1 ]
Anuar, Nor Badrul [1 ]
机构
[1] Univ Malaya, Dept Comp Syst & Technol, Fac Comp Sci & Informat Technol, Kuala Lumpur, Wilayah Perseku, Malaysia
关键词
Android malware; Android security; Evasion techniques; Machine learning; Obfuscation techniques; DEEP LEARNING-METHOD; HYBRID APPROACH; SYSTEM; FEATURES; CODE; SIGNATURE; FRAMEWORK; ANALYZER; ATTACKS; THREAT;
D O I
10.7717/peerj-cs.907
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious code. Therefore, Android applications developers tend to use state-of-the-art obfuscation techniques to mitigate the risk of application plagiarism. The malware authors adopt the obfuscation and transformation techniques to defeat the anti-malware detections, which this paper refers to as evasions. Malware authors use obfuscation techniques to generate new malware variants from the same malicious code. The concern of encountering difficulties in malware reverse engineering motivates researchers to secure the source code of benign Android applications using evasion techniques. This study reviews the state-of-the-art evasion tools and techniques. The study criticizes the existing research gap of detection in the latest Android malware detection frameworks and challenges the classification performance against various evasion techniques. The study concludes the research gaps in evaluating the current Android malware detection framework robustness against state-of-the-art evasion techniques. The study concludes the recent Android malware detection-related issues and lessons learned which require researchers' attention in the future.
引用
收藏
页数:61
相关论文
共 50 条
  • [1] The rise of obfuscated Android malware and impacts on detection methods
    Elsersy W.F.
    Feizollah A.
    Anuar N.B.
    PeerJ Computer Science, 2022, 8
  • [2] Unified Detection of Obfuscated and Native Android Malware
    Ouk, Pagnchakneat C.
    Pak, Wooguil
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 3099 - 3116
  • [3] An Overview of Techniques for Obfuscated Android Malware Detection
    Siddiqui S.
    Khan T.A.
    SN Computer Science, 5 (4)
  • [4] A Deep Learning Method for Obfuscated Android Malware Detection
    Dasiah, Nitin Benjamin
    Gain, Ritu
    Sabarisrinivas, V.
    Sitara, K.
    Communications in Computer and Information Science, 2024, 2128 CCIS : 149 - 164
  • [5] Detection Efficiency of Static Analyzers against Obfuscated Android Malware
    Ajiri, Victor
    Butakov, Sergey
    Zavarsky, Pavol
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 231 - 234
  • [6] AndroDex: Android Dex Images of Obfuscated Malware
    Aurangzeb, Sana
    Aleem, Muhammad
    Khan, Muhammad Taimoor
    Loukas, George
    Sakellari, Georgia
    SCIENTIFIC DATA, 2024, 11 (01)
  • [7] Evaluation of Survivability of the Automatically Obfuscated Android Malware
    Patel, Himanshu
    Patel, Deep
    Ahluwalia, Jaspreet
    Kapoor, Vaishali
    Narasimhan, Karthik
    Singh, Harmanpreet
    Kaur, Harmanjot
    Reddy, Gadi Harshitha
    Peruboina, Sai Sushma
    Butakov, Sergey
    APPLIED SCIENCES-BASEL, 2022, 12 (10):
  • [8] Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN
    Dhanya, K. A. K.
    Vinod, P.
    Yerima, Suleiman Y. Y.
    Bashar, Abul
    David, Anwin
    Abhiram, T.
    Antony, Alan
    Shavanas, Ashil K.
    Kumar, T. Gireesh
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2756 - 2766
  • [9] DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware
    Suarez-Tangil, Guillermo
    Dash, Santanu Kumar
    Ahmadi, Mansour
    Kinder, Johannes
    Giacinto, Giorgio
    Cavallaro, Lorenzo
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 309 - 320
  • [10] DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection
    Millar, Stuart
    McLaughlin, Niall
    del Rincon, Jesus Martinez
    Miller, Paul
    Zhao, Ziming
    PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 353 - 364