A Comparative Study of Android Malware Behavior in Different Contexts

被引:1
|
作者
Boileau, Catherine [1 ]
Gagnon, Francois [2 ]
Poisson, Jeremie [2 ]
Frenette, Simon [2 ]
Mejri, Mohamed [1 ]
机构
[1] Univ Laval, Quebec City, PQ, Canada
[2] Cegep St Foy, CybersecLab, Quebec City, PQ, Canada
来源
DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1 | 2016年
关键词
Dynamic Malware Analysis; Android; Sandboxing;
D O I
10.5220/0005997300470054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the numerous ways of addressing the Android malware threat is to run malicious applications in a sandbox environment while monitoring metrics. However, dynamic malware analysis is usually concerned with a one-time execution of an application, and information about behaviour in different environments is lacking in the literature. We fill this gap with a fuzzy-like approach to the problem: by running the same malware multiple times in different environments, we gain insight on the malware behaviour and his peculiarities. To implement this approach, we leverage a client-server sandbox to run experiments, based on a common suit of actions. Scenarios are executed multiple times on a malware sample, each time with a different parameter, and results are compared to determine variation in observed behaviour. In our current experiment, variation was introduced by different levels of simulation, allowing us to compare metrics such as failure rate, data leakages, sending of SMS, and the number of HTTP and DNS requests. We find the behaviour is different for data leakages, which require no simulation to leak information, while all results for other metrics were higher when simulation was used in experiments. We expect that a fuzzing approach with others parameters will further our understanding of malware behaviour, particularly for malware bound to such parameters.
引用
收藏
页码:47 / 54
页数:8
相关论文
共 50 条
  • [21] Deep Android Malware Detection
    McLaughlin, Niall
    del Rincon, Jesus Martinez
    Kang, BooJoong
    Yerima, Suleiman
    Miller, Paul
    Sezer, Sakir
    Safaei, Yeganeh
    Trickel, Erik
    Zhao, Ziming
    Doup, Adam
    Ahn, Gail Joon
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 301 - 308
  • [22] Features to Detect Android Malware
    Urcuqui Lopez, Christian Camilo
    Delgado Villarreal, Jhoan Steven
    Perez Belalcazar, Andres Felipe
    Navarro Cadavid, Andres
    Diaz Cely, Javier Gustavo
    2018 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2018,
  • [23] Performance of Malware classifier for Android
    Alam, Mohammed S.
    Vuong, Son T.
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [24] Improve User's Security Literacy by Experiencing Behavior of Pseudo Android Malware
    Kato, Makoto
    Matsuura, Saeko
    2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 602 - 603
  • [25] Runtime-based Behavior Dynamic Analysis System for Android Malware Detection
    Min, Luoxu
    Cao, Qinghua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 233 - 236
  • [26] Detecting and classifying method based on similarity matching of Android malware behavior with profile
    Jang, Jae-Wook
    Yun, Jaesung
    Mohaisen, Aziz
    Woo, Jiyoung
    Kim, Huy Kang
    SPRINGERPLUS, 2016, 5
  • [27] Composition-malware: building Android malware at run time
    Canfora, Gerardo
    Mercaldo, Francesco
    Moriano, Giovanni
    Visaggio, Corrado Aaron
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 318 - 326
  • [28] Darwinian Malware Detectors: A Comparison of Evolutionary Solutions to Android Malware
    Wilkins, Zachary
    Zincir-Heywood, Nur
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 1651 - 1658
  • [29] A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform
    Huang, Heqing
    Zheng, Cong
    Zeng, Junyuan
    Zhou, Wu
    Zhu, Sencun
    Liu, Peng
    Molloy, Ian
    Chari, Suresh
    Zhang, Ce
    Guan, Quanlong
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (02) : 255 - 270
  • [30] A pragmatic android malware detection procedure
    Palumbo, Paolo
    Sayfullina, Luiza
    Komashinskiy, Dmitriy
    Eirola, Emil
    Karhunen, Juha
    COMPUTERS & SECURITY, 2017, 70 : 689 - 701