DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications

被引:14
作者
Cho, Haehyun [1 ]
Yi, Jeong Hyun [2 ]
Ahn, Gail-Joon [3 ]
机构
[1] Arizona State Univ, Ctr Cybersecur & Digital Forens, Tempe, AZ 85281 USA
[2] Soongsil Univ, Cyber Secur Res Ctr, Seoul 06978, South Korea
[3] Samsung Elect, Samsung Res, Seoul 06765, South Korea
基金
新加坡国家研究基金会;
关键词
Bytecode monitoring; Android application analysis; mobile security;
D O I
10.1109/ACCESS.2018.2881699
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Both Android application developers and malware authors use sophisticated obfuscation tools to prevent their mobile applications from being repackaged and analyzed. These tools obfuscate sensitive strings and classes, API calls, and control flows in the Dalvik bytecode. Consequently, it is inevitable for the security analysts to spend the significant amount of time for understanding the robustness of these obfuscation techniques and fully comprehending the intentions of each application. Since such analyses are often error-prone and require extensive analysis experience, it is critical to explore a novel approach to systematically analyzeAndroid application bytecode. In this paper, we propose an approach to address such a critical challenge by placing hooks in the Dalvik virtual machine at the point where a Dalvik instruction is about to be executed. Also, we demonstrate the effectiveness of our approach through case studies on real-world applications with our prototype called DexMonitor.
引用
收藏
页码:71229 / 71240
页数:12
相关论文
共 26 条
[1]  
[Anonymous], 2011, USENIX SECURITY S
[2]  
[Anonymous], 2013, GOOGLE PLAY HITS 1 M
[3]  
[Anonymous], INT J DISTRIB SENS N
[4]  
Apvrille A., 2013, HACKTIVITY
[5]  
Aucsmith D., 1996, Information Hiding. First International Workshop Proceedings, P317
[6]   Statistical Deobfuscation of Android Applications [J].
Bichsel, Benjamin ;
Raychev, Veselin ;
Tsankov, Petar ;
Vechev, Martin .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :343-355
[7]  
Chen Y, 2010, CONSUM COMM NETWORK, P1
[8]   Anti-debugging scheme for protecting mobile apps on android platform [J].
Cho, Haehyun ;
Lim, Jongsu ;
Kim, Hyunki ;
Yi, Jeong Hyun .
JOURNAL OF SUPERCOMPUTING, 2016, 72 (01) :232-246
[9]  
Dolberg L., 2014, International Conference on Security and Privacy in Communication Networks-10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I, volume 152 of SecureComm'14, P498
[10]   A Survey on Automated Dynamic Malware-Analysis Techniques and Tools [J].
Egele, Manuel ;
Scholte, Theodoor ;
Kirda, Engin ;
Kruegel, Christopher .
ACM COMPUTING SURVEYS, 2012, 44 (02)