FLOWMINER: Automatic Summarization of Library Data-Flow for Malware Analysis

被引:3
|
作者
Deering, Tom [1 ]
Santhanam, Ganesh Ram [2 ]
Kothari, Suresh [2 ]
机构
[1] Workiva, 2900 Unvers Blvd, Ames, IA 50010 USA
[2] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
D O I
10.1007/978-3-319-26961-0_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malware often conceal their malicious behavior by making unscrupulous use of library APIs. Hence any accurate malware analysis must track data-flows not only through the application but also through the library. Libraries like Android (2 mLOC) are too large to be analyzed repeatedly with each application, hence we need to compute data-flow summaries of libraries that are expressive enough to reveal possible malicious flows, and compact to be included in malware analysis along with each application. We present FLOWMINER, a novel approach to automatically extract the data-flow summary of a Java library, given its source or bytecode. FLOWMINER's summaries are fine-grained, i.e., preserve key artifacts from the original library to enable accurate context, object, field, flow and type-sensitive malware analysis of applications in conjunction with the library. Unlike prior summarization techniques, FLOWMINER resolves method calls to anonymous classes to a single target, making it more precise. FLOWMINER's summaries are compact, e.g., contain only about a third (fourth) of the nodes (edges, resp.) in the data-flow semantics of recent versions of Android. FLOWMINER's summaries are stored in XML, allowing any analysis tool to use them for analysis.
引用
收藏
页码:171 / 191
页数:21
相关论文
共 50 条
  • [21] Extended data-flow architecture for data analysis and visualization
    Abram, Greg
    Treinish, Lloyd
    Computer Graphics (ACM), 1995, 29 (02): : 17 - 21
  • [22] Automatic test suite generator based on data-flow and data-selection
    Wang, Jianguo
    Wu, Jianping
    Chen, Xiuhuan
    2000, (40):
  • [23] EFFICIENT DATA-FLOW ANALYSIS OF LOGIC PROGRAMS
    DEBRAY, SK
    JOURNAL OF THE ACM, 1992, 39 (04) : 949 - 984
  • [24] ON THE COMPLEXITY OF DATA-FLOW ANALYSIS OF LOGIC PROGRAMS
    DEBRAY, SK
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1995, 17 (02): : 331 - 365
  • [25] Improving data-flow analysis with path profiles
    Ammons, G
    Larus, JR
    ACM SIGPLAN NOTICES, 2004, 39 (04) : 568 - 569
  • [26] Analysis of a data-flow in a financial IoT system
    Cuomo, Salvatore
    Di Somma, Vittorio
    Sica, Federica
    8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 : 508 - 512
  • [27] Run-time data-flow analysis
    Li, JH
    Zang, BY
    Wu, R
    Zhu, CQ
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 17 (04) : 442 - 449
  • [28] TRACTABLE DATA-FLOW ANALYSIS FOR DISTRIBUTED SYSTEMS
    CHEUNG, SC
    KRAMER, J
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1994, 20 (08) : 579 - 593
  • [29] ON THE COMPLEXITY OF DATA-FLOW ANALYSIS OF LOGIC PROGRAMS
    DEBRAY, SK
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 623 : 509 - 520
  • [30] DATA-FLOW ANALYSIS OF ARRAY AND SCALAR REFERENCES
    FEAUTRIER, P
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 1991, 20 (01) : 23 - 53