MIME: A Formal Approach to (Android) Emulation Malware Analysis

被引:1
|
作者
Bellini, Fabio [1 ]
Chiodi, Roberto [1 ]
Mastroeni, Isabella [1 ]
机构
[1] Univ Verona, Dipartimento Informat, Verona, Italy
来源
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015) | 2016年 / 9482卷
关键词
Anti-emulation malware; Abstract non-interference; Program analysis;
D O I
10.1007/978-3-319-30303-1_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a new dynamic and configurable approach to anti-emulation malware analysis, aiming at improving transparency of existing analyses techniques. We test the effectiveness of existing widespread free analyzers and we observe that the main problem of these analyses is that they provide static and immutable values to the parameter used in anti-emulation tests. Our approach aims at overcoming these limitations by providing an abstract non-interference-based approach modeling the fact that parameters can be modified dynamically, and the corresponding executions compared.
引用
收藏
页码:259 / 267
页数:9
相关论文
共 31 条
  • [21] HEAT: a combined approach for thread escape analysis
    Chen, Qichang
    Wang, Liqiang
    Yang, Zijiang
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2011, 2 (02) : 135 - 143
  • [22] A User-Guided Approach to Program Analysis
    Mangal, Ravi
    Zhang, Xin
    Nori, Aditya V.
    Naik, Mayur
    2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, 2015, : 462 - 473
  • [23] An algebraic approach to sharing analysis of logic programs
    Codish, M
    Lagoon, V
    Bueno, F
    JOURNAL OF LOGIC PROGRAMMING, 2000, 42 (02): : 111 - 149
  • [24] A REWRITING LOGIC SEMANTICS APPROACH TO MODULAR PROGRAM ANALYSIS
    Hills, Mark
    Rosu, Grigore
    PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON REWRITING TECHNIQUES AND APPLICATIONS (RTA'10), 2010, 6 : 151 - 160
  • [25] LLVM based approach to static analysis of C programs in SAPFOR
    Kataev, Nikita
    2018 IVANNIKOV MEMORIAL WORKSHOP (IVMEM 2018), 2018, : 19 - 23
  • [26] Application of Symbolic Approach to the Bernstein Expansion for Program Analysis and Optimization
    F. Clauss
    I. Yu. Chupaeva
    Programming and Computer Software, 2004, 30 : 164 - 172
  • [27] A New Approach to Non-termination Analysis of Logic Programs
    Voets, Dean
    De Schreye, Danny
    LOGIC PROGRAMMING, 2009, 5649 : 220 - 234
  • [28] Application of symbolic approach to the Bernstein expansion for program analysis and optimization
    Clauss, F
    Chupaeva, IY
    PROGRAMMING AND COMPUTER SOFTWARE, 2004, 30 (03) : 164 - 172
  • [29] Vulnerabilities Constraint Based Analysis Approach for Java']Java Bytecode Programs
    Achour, Safaa
    Benattou, Mohammed
    PROCEEDINGS OF 2018 6TH INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2018, : 93 - 98
  • [30] ACHyb: A Hybrid Analysis Approach to Detect Kernel Access Control Vulnerabilities
    Hu, Yang
    Wang, Wenxi
    Hunger, Casen
    Wood, Riley
    Khurshid, Sarfraz
    Tiwari, Mohit
    PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 316 - 327