Detection of app collusion potential using logic programming

被引:5
作者
Blasco, Jorge [1 ]
Chen, Thomas M. [2 ]
Muttik, Igor [3 ]
Roggenbach, Markus [4 ]
机构
[1] Univ London, Informat Secur Grp, London, England
[2] City Univ London, Elect & Elect Engn Dept, London, England
[3] Cyber Curio, Berkhamsted, England
[4] Swansea Univ, Dept Comp Sci, Swansea, W Glam, Wales
基金
英国工程与自然科学研究理事会;
关键词
Android; Collusion; Malware; MoPlus; SECURITY; MALWARE;
D O I
10.1016/j.jnca.2017.12.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices pose a particular security risk because they hold personal details (accounts, locations, contacts, photos) and have capabilities potentially exploitable for eavesdropping (cameras/microphone, wireless connections). The Android operating system is designed with a number of built-in security features such as application sandboxing and permission-based access control. Unfortunately, these restrictions can be bypassed, without the user noticing, by colluding apps whose combined permissions allow them to carry out attacks that neither app is able to execute by itself. While the possibility of app collusion was first warned in 2011, it has been unclear if collusion is used by malware in the wild due to a lack of suitable detection methods and tools. This paper describes how we found the first collusion in the wild. We also present a strategy for detecting collusions and its implementation in Prolog that allowed us to make this discovery. Our detection strategy is grounded in concise definitions of collusion and the concept of ASR (Access-Send Receive) signatures. The methodology is supported by statistical evidence. Our approach scales and is applicable to inclusion into professional malware detection systems: we applied it to a set of more than 50,000 apps collected in the wild. Code samples of our tool as well as of the detected malware are available.
引用
收藏
页码:88 / 104
页数:17
相关论文
共 36 条
[1]  
[Anonymous], 2011, USENIX SEC S
[2]  
[Anonymous], 2015, NDSS
[3]  
[Anonymous], 2011, TR201104 TU DARMST
[4]  
[Anonymous], 2011, NDSS
[5]  
[Anonymous], 2014, 21 ANN NETW DISTR SY
[6]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[7]  
Asavoae I. M., 2016, FMICS AVOCS 16
[8]  
Asavoae I. M., 2017, P 19 WORKSH FORM TEC
[9]  
Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
[10]  
Blasco J., 2016, VIRUSBULLETIN 2016