DroidHook: a novel API-hook based Android malware dynamic analysis sandbox

被引:15
作者
Cui, Yuning [1 ,2 ]
Sun, Yi [1 ,2 ]
Lin, Zhaowen [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Pilot Software Engn Sch, Sch Comp Sci, Beijing, Peoples R China
[2] Natl Engn Lab Mobile Network Secur No 2013 2685, Beijing, Peoples R China
关键词
Android; Mobile malware; Dynamic analysis; Sandbox; FEATURES; SYSTEM; MODEL;
D O I
10.1007/s10515-023-00378-w
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the popularity of Android devices, mobile apps are prevalent in our daily life, making them a target for attackers to steal private data and push advertisements. Dynamic analysis is an effective approach to detect runtime behavior of Android malware and can reduce the impact of code obfuscation. However, some dynamic sandboxes commonly used by researchers are usually based on emulators with older versions of Android, for example, the state-of-the-art sandbox, DroidBox. These sandboxes are vulnerable to evasion attacks and may not work with the latest apps. In this paper, we propose a prototype framework, DroidHook, as a novel automated sandbox for Android malware dynamic analysis. Unlike most existing tools, DroidHook has two obvious advantages. Firstly, the set of APIs to be monitored by DroidHook can be easily modified, so that DroidHook is ideally suitable for diverse situations, including the detection of a specific family of malware and unknown malware. Secondly, DroidHook does not depend on a specific Android OS but only on Xposed, so it can work with multiple Android versions and can perform normally on both emulators and real devices. Experiments show that DroidHook can provide more fine-grained and precise results than DroidBox. Moreover, with the support for real devices and new versions of Android, DroidHook can run most samples properly and acquire stronger detection results, compared to emulator-based tools.
引用
收藏
页数:22
相关论文
共 37 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]  
Alzaylaee MK, 2016, 2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY)
[3]  
Alzaylaee MK, 2017, PROCEEDINGS OF THE 3RD ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2017, P65, DOI 10.1145/3041008.3041010
[4]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[5]   SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [J].
Arshad, Saba ;
Shah, Munam A. ;
Wahid, Abdul ;
Mehmood, Amjad ;
Song, Houbing ;
Yu, Hongnian .
IEEE ACCESS, 2018, 6 :4321-4339
[6]  
AV-TEST, 2020, MALW STAT TRENDS REP
[7]   DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling [J].
Cai, Haipeng ;
Meng, Na ;
Ryder, Barbara ;
Yao, Daphne .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (06) :1455-1470
[8]  
Chang WL, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC)
[9]   Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection [J].
Chen, Xiao ;
Li, Chaoran ;
Wang, Derui ;
Wen, Sheng ;
Zhang, Jun ;
Nepal, Surya ;
Xiang, Yang ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :987-1001
[10]   DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications [J].
Cho, Haehyun ;
Yi, Jeong Hyun ;
Ahn, Gail-Joon .
IEEE ACCESS, 2018, 6 :71229-71240