MIME: A Formal Approach to (Android) Emulation Malware Analysis

被引:1
|
作者
Bellini, Fabio [1 ]
Chiodi, Roberto [1 ]
Mastroeni, Isabella [1 ]
机构
[1] Univ Verona, Dipartimento Informat, Verona, Italy
来源
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015) | 2016年 / 9482卷
关键词
Anti-emulation malware; Abstract non-interference; Program analysis;
D O I
10.1007/978-3-319-30303-1_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new dynamic and configurable approach to anti-emulation malware analysis, aiming at improving transparency of existing analyses techniques. We test the effectiveness of existing widespread free analyzers and we observe that the main problem of these analyses is that they provide static and immutable values to the parameter used in anti-emulation tests. Our approach aims at overcoming these limitations by providing an abstract non-interference-based approach modeling the fact that parameters can be modified dynamically, and the corresponding executions compared.
引用
收藏
页码:259 / 267
页数:9
相关论文
共 31 条
  • [1] Revealing Similarities in Android Malware by Dissecting their Methods
    Pasetto, Michele
    Marastoni, Niccolo
    Dalla Preda, Mila
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 625 - 634
  • [2] A Component-Sensitive Static Analysis Based Approach for Modeling Intents in Android Apps
    Abolhassani, Negarsadat
    Halfond, William G. J.
    2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION, ICSME, 2023, : 97 - 109
  • [3] Identifying Behavior Dispatchers for Malware Analysis
    Park, Kyuhong
    Sahin, Burak
    Chen, Yongheng
    Zhao, Jisheng
    Downing, Evan
    Hu, Hong
    Lee, Wenke
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 759 - 773
  • [4] droid: Assessment and Evaluation of Android Application Analysis Tools
    Reaves, Bradley
    Bowers, Jasmine
    Gorski, Sigmund Albert, III
    Anise, Olabode
    Bobhate, Rahul
    Cho, Raymond
    Das, Hiranava
    Hussain, Sharique
    Karachiwala, Hamza
    Scaife, Nolen
    Wright, Byron
    Butler, Kevin
    Enck, William
    Traynor, Patrick
    ACM COMPUTING SURVEYS, 2016, 49 (03)
  • [5] ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation
    Zhou, Anshunkang
    Hu, Yikun
    Xu, Xiangzhe
    Zhang, Charles
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2024, 33 (04)
  • [6] API Compatibility Issue Detection, Testing and Analysis for Android Apps
    Mahmud, Tarek
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 1061 - 1063
  • [7] Detection of Global, Metamorphic Malware Variants Using Control and Data Flow Analysis
    Agrawal, Hira
    Bahler, Lisa
    Micallef, Josephine
    Snyder, Shane
    Virodov, Alexandr
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [8] REHANA: An Efficient Program Analysis Framework to Uncover Reflective Code in Android
    Bachala, Shakthi
    Tsutano, Yutaka
    Srisa-an, Witawas
    Rothermel, Gregg
    Dinh, Jackson
    Hu, Yuanjiu
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES, 2022, 419 : 347 - 374
  • [9] On the Analysis of Mobile Apps. Why is most of our Research on Android?
    Gorla, Alessandra
    PROCEEDINGS OF THE 17TH INNOVATIONS IN SOFTWARE ENGINEERING CONFERENCE, ISEC 2024, 2024,
  • [10] Security analysis of permission re-delegation vulnerabilities in Android apps
    Biniam Fisseha Demissie
    Mariano Ceccato
    Lwin Khin Shar
    Empirical Software Engineering, 2020, 25 : 5084 - 5136