Automated Hybrid Analysis of Android Malware through Augmenting Fuzzing with Forced Execution

被引:17
|
作者
Wang, Xiaolei [1 ]
Yang, Yuexiang [1 ]
Zhu, Sencun [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[2] Penn State Univ, Coll Informat Sci & Technol, Dept Comp Sci & Engn, State Coll, PA 16801 USA
关键词
Malware; Fuzzing; Computer crashes; Instruments; Mobile computing; Dynamics; Android; malware; dynamic analysis; fuzzing; forced execution;
D O I
10.1109/TMC.2018.2886881
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automatically triggering malicious behaviors is an essential step to understand malware for developing effective solutions. Existing automated dynamic analysis approaches usually try to trigger the malicious behaviors by relying on simple fuzzing or complex input generation techniques (e.g., concolic execution). However, advanced malware often adopt various evasion techniques to hide malicious behaviors, e.g., by introducing complex condition checks which are very hard to trigger. In this paper, we propose a new approach named DirectDroid, which bypasses related checks through on-demand forced execution while adopting fuzzing to feed the necessary program input. In this way, many hidden malicious behaviors can be successfully triggered. To ensure the normal execution towards the malicious behaviors, DirectDroid also largely handles potential program crashes caused by forced execution. Finally, we implement a prototype of DirectDroid and evaluate it against 951 recent malware samples. Our experiment results show that DirectDroid can trigger many more malicious behaviors than several previous works, even when crashes happened. Our further analysis shows that DirectDroid has a low false positive rate even though it adopts forced execution.
引用
收藏
页码:2768 / 2782
页数:15
相关论文
共 39 条
  • [1] Driller: Augmenting Fuzzing Through Selective Symbolic Execution
    Stephens, Nick
    Grosen, John
    Salls, Christopher
    Dutcher, Andrew
    Wang, Ruoyu
    Corbetta, Jacopo
    Shoshitaishvili, Yan
    Kruegel, Christopher
    Vigna, Giovanni
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [2] Manilyzer: Automated Android Malware Detection through Manifest Analysis
    Feldman, Stephen
    Stadther, Dillon
    Wang, Bing
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 767 - 772
  • [3] Detection and Mitigation of Android Malware Through Hybrid Approach
    Patel, Kanubhai
    Buddadev, Bharat
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 455 - 463
  • [4] HAAMD:Hybrid Analysis for Android Malware Detection
    Choudhary, Mahima
    Kishore, Brij
    2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [5] Familial Classification of Android Malware using Hybrid Analysis
    Cavli, Omer Faruk Turan
    Sen, Sevil
    2020 INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCTURKEY 2020), 2020, : 62 - 67
  • [6] Hybrid Detection Using Permission Analysis for Android Malware
    Jiao, Haofeng
    Li, Xiaohong
    Zhang, Lei
    Xu, Guangquan
    Feng, Zhiyong
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 541 - 545
  • [7] FANS: Fuzzing Android Native System Services via Automated Interface Analysis
    Liu, Baozheng
    Zhang, Chao
    Gong, Guang
    Zeng, Yishun
    Ruan, Haifeng
    Zhuge, Jianwei
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 307 - 323
  • [8] Android malware defense through a hybrid multi-modal approach
    Asmitha, K. A.
    Vinod, P.
    Rehiman, Rafidha K. A.
    Raveendran, Neeraj
    Conti, Mauro
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 233
  • [9] Attack Tree Based Android Malware Detection with Hybrid Analysis
    Zhao, Shuai
    Li, Xiaohong
    Xu, Guangquan
    Zhang, Lei
    Feng, Zhiyong
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 380 - 387
  • [10] Hybrid machine learning model for malware analysis in android apps
    Bashir, Saba
    Maqbool, Farwa
    Khan, Farhan Hassan
    Abid, Asif Sohail
    PERVASIVE AND MOBILE COMPUTING, 2024, 97