A Comparative Study of Android Malware Behavior in Different Contexts

被引:1
作者
Boileau, Catherine [1 ]
Gagnon, Francois [2 ]
Poisson, Jeremie [2 ]
Frenette, Simon [2 ]
Mejri, Mohamed [1 ]
机构
[1] Univ Laval, Quebec City, PQ, Canada
[2] Cegep St Foy, CybersecLab, Quebec City, PQ, Canada
来源
DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1 | 2016年
关键词
Dynamic Malware Analysis; Android; Sandboxing;
D O I
10.5220/0005997300470054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the numerous ways of addressing the Android malware threat is to run malicious applications in a sandbox environment while monitoring metrics. However, dynamic malware analysis is usually concerned with a one-time execution of an application, and information about behaviour in different environments is lacking in the literature. We fill this gap with a fuzzy-like approach to the problem: by running the same malware multiple times in different environments, we gain insight on the malware behaviour and his peculiarities. To implement this approach, we leverage a client-server sandbox to run experiments, based on a common suit of actions. Scenarios are executed multiple times on a malware sample, each time with a different parameter, and results are compared to determine variation in observed behaviour. In our current experiment, variation was introduced by different levels of simulation, allowing us to compare metrics such as failure rate, data leakages, sending of SMS, and the number of HTTP and DNS requests. We find the behaviour is different for data leakages, which require no simulation to leak information, while all results for other metrics were higher when simulation was used in experiments. We expect that a fuzzing approach with others parameters will further our understanding of malware behaviour, particularly for malware bound to such parameters.
引用
收藏
页码:47 / 54
页数:8
相关论文
共 50 条
  • [31] A survey of android application and malware hardening
    Sihag, Vikas
    Vardhan, Manu
    Singh, Pradeep
    COMPUTER SCIENCE REVIEW, 2021, 39
  • [32] How to Tame Your Android Malware
    Burke, Ivan
    Pieterse, Heloise
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 54 - 65
  • [33] Static and Dynamic Analysis of Android Malware
    Kapratwar, Ankita
    Di Troia, Fabio
    Stamp, Mark
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 653 - 662
  • [34] Deep Android Malware Detection and Classification
    Vinayakumar, R.
    Soman, K. P.
    Poornachandran, Prabaharan
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1677 - 1683
  • [35] An Analysis of Android Malware Classification Services
    Rashed, Mohammed
    Suarez-Tangil, Guillermo
    SENSORS, 2021, 21 (16)
  • [36] An Android malware static detection model
    Yang H.-Y.
    Xu J.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2018, 48 (02): : 564 - 570
  • [37] Android Malware Detection & Protection: A Survey
    Arshad, Saba
    Khan, Abid
    Shah, Munam Ali
    Ahmed, Mansoor
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (02) : 463 - 475
  • [38] Understanding the Root of Attack in Android Malware
    Romli, Rahiwan Nazar
    Zolkipli, Mohamad Fadli
    Al-Ma'arif, Ahmad
    Ramli, Muhamad Ramiza
    Salamat, Mohamad Aizi
    INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2018, 10 (06): : 203 - 208
  • [39] Android SMS Malware: Vulnerability and Mitigation
    Hamandi, Khodor
    Chehab, Ali
    Elhajj, Imad H.
    Kayssi, Ayman
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 1004 - 1009
  • [40] Intelligent Approach for Android Malware Detection
    Abdulla, Shubair
    Altaher, Altyeb
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (08): : 2964 - 2983