Toward a more dependable hybrid analysis of android malware using aspect-oriented programming

被引:29
作者
Ali-Gombe, Aisha I. [1 ]
Saltaformaggio, Brendan [2 ]
Ramanujam, J. Ram [3 ]
Xu, Dongyan [4 ]
Richard, Golden G., III [3 ]
机构
[1] Towson Univ, Dept Comp & Informat Sci, RM 447,7800 York Rd, Towson, MD 21252 USA
[2] Georgia Inst Technol, Sch Elect & Comp Engn, Klaus Adv Comp Bldg,266 Ferst Dr NW, Atlanta, GA 30332 USA
[3] Louisiana State Univ, Ctr Computat & Technol, 2027-C Digital Media Ctr, Baton Rouge, LA 70803 USA
[4] Purdue Univ, Dept Comp Sci, 305 N Univ St, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
Hybrid analysis; Bytecode weaving; Instrumentation; Dynamic execution; Android; Malware; Dataflow;
D O I
10.1016/j.cose.2017.11.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growing threat to user privacy by Android applications (app) has tremendously increased the need for more reliable and accessible analysis techniques. This paper presents AspectDroid(1)-an offline app-level hybrid analysis system designed to investigate Android applications for possible unwanted activities. It leverages static bytecode instrumentation to weave in analysis routines into an existing application to provide efficient dataflow analysis, detection of resource abuse, and analytics of suspicious behaviors, which are then monitored dynamically at runtime. Unlike operating system or framework dependent approaches, AspectDroid does not require porting from one version of Android to another, nor does it depend on a particular Android runtime, making it a more adaptable and easier to use technique.We evaluate the strength of our dataflow algorithm on 105 apps from the DroidBench corpus, with experimental results demonstrating that AspectDroid can detect tagged data with 94.68% accuracy. Furthermore, we compare and contrast the behavioral patterns in 100 malware samples from the Drebin dataset (Arp et al., 2014) and 100 apps downloaded from Google Play. Our results showed more traces of sensitive data exfiltration, abuse of resources, as well as suspicious use of programming concepts like reflection, native code, and dynamic classes in the malware set than the Google Play apps. In terms of runtime overhead, our experiments indicate AspectDroid can comprehensively log relevant security concerns with an approximate overhead of 1 MB memory and a 5.9% average increase in CPU usage. (C) 2017 Published by Elsevier Ltd.
引用
收藏
页码:235 / 248
页数:14
相关论文
共 43 条
  • [1] Afonso V. M., 2016, NDSS
  • [2] Identifying Android malware using dynamically obtained features
    Afonso, Vitor Monte
    de Amorim, Matheus Favero
    Abed Gregio, Andre Ricardo
    Junquera, Glauco Barroso
    de Geus, Paulo Licio
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01): : 9 - 17
  • [3] AspectDroid: Android App Analysis System
    Ali-Gombe, Aisha
    Ahmed, Irfan
    Richard, Golden G., III
    Roussev, Vassil
    [J]. CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 145 - 147
  • [4] *ANDR STUD, 2015, ANDR DEV
  • [5] [Anonymous], 2014, NDSS
  • [6] [Anonymous], 2015, NDSS
  • [7] [Anonymous], 2010, P 9 USENIX C OP SYST
  • [8] [Anonymous], 2013, Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY)
  • [9] [Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
  • [10] [Anonymous], 2012, TRUST TRUSTWORTHY CO