FLOWMINER: Automatic Summarization of Library Data-Flow for Malware Analysis

被引:3
|
作者
Deering, Tom [1 ]
Santhanam, Ganesh Ram [2 ]
Kothari, Suresh [2 ]
机构
[1] Workiva, 2900 Unvers Blvd, Ames, IA 50010 USA
[2] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
D O I
10.1007/978-3-319-26961-0_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malware often conceal their malicious behavior by making unscrupulous use of library APIs. Hence any accurate malware analysis must track data-flows not only through the application but also through the library. Libraries like Android (2 mLOC) are too large to be analyzed repeatedly with each application, hence we need to compute data-flow summaries of libraries that are expressive enough to reveal possible malicious flows, and compact to be included in malware analysis along with each application. We present FLOWMINER, a novel approach to automatically extract the data-flow summary of a Java library, given its source or bytecode. FLOWMINER's summaries are fine-grained, i.e., preserve key artifacts from the original library to enable accurate context, object, field, flow and type-sensitive malware analysis of applications in conjunction with the library. Unlike prior summarization techniques, FLOWMINER resolves method calls to anonymous classes to a single target, making it more precise. FLOWMINER's summaries are compact, e.g., contain only about a third (fourth) of the nodes (edges, resp.) in the data-flow semantics of recent versions of Android. FLOWMINER's summaries are stored in XML, allowing any analysis tool to use them for analysis.
引用
收藏
页码:171 / 191
页数:21
相关论文
共 50 条
  • [31] OPTIMIZING SPARSE REPRESENTATIONS FOR DATA-FLOW ANALYSIS
    RUF, E
    SIGPLAN NOTICES, 1995, 30 (03): : 50 - 61
  • [32] COMPILING DATA-FLOW ANALYSIS OF LOGIC PROGRAMS
    TAN, JC
    LIN, IP
    SIGPLAN NOTICES, 1992, 27 (07): : 106 - 115
  • [33] An empirical study of iterative data-flow analysis
    Cooper, Keith D.
    Harvey, Timothy J.
    Kennedy, Ken
    CIC 2006: 15TH INTERNATIONAL CONFERENCE ON COMPUTING, PROCEEDINGS, 2006, : 266 - +
  • [34] Improving data-flow analysis with path profiles
    Ammons, G
    Larus, JR
    ACM SIGPLAN NOTICES, 1998, 33 (05) : 72 - 84
  • [35] EFFECTIVELY EXPLOITING PARALLELISM IN DATA-FLOW ANALYSIS
    LEE, YF
    RYDER, BG
    JOURNAL OF SUPERCOMPUTING, 1994, 8 (03): : 233 - 262
  • [36] Data-flow Analysis of Programs with Associative Arrays
    Hauzar, David
    Kofron, Jan
    Bastecky, Pavel
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (150): : 56 - 70
  • [37] Run-time data-flow analysis
    Jianhui Li
    Binyu Zang
    Rong Wu
    Chuanqi Zhu
    Journal of Computer Science and Technology, 2002, 17 : 442 - 449
  • [38] StubDroid: Automatic Inference of Precise Data-flow Summaries for the Android Framework
    Arzt, Steven
    Bodden, Eric
    2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2016, : 725 - 735
  • [39] DATA-FLOW ARCHITECTURE
    LERNER, EJ
    IEEE SPECTRUM, 1984, 21 (04) : 57 - 62
  • [40] DATA-FLOW ARCHITECTURES
    CULLER, A
    CULLER, DE
    ANNUAL REVIEW OF COMPUTER SCIENCE, 1986, 1 : 225 - 253