Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation

被引:45
作者
Duan, Yue [1 ]
Zhang, Mu [2 ]
Bhaskar, Abhishek Vasisht [3 ]
Yin, Heng [1 ]
Pan, Xiaorui [4 ]
Li, Tongxin [5 ]
Wang, Xueqiang [4 ]
Wang, XiaoFeng [4 ]
机构
[1] Univ Calif Riverside, Riverside, CA 92521 USA
[2] Cornell Univ, Ithaca, NY 14853 USA
[3] Grammatech Inc, Bethesda, MD USA
[4] Indiana Univ Bloomington, Bloomington, IN USA
[5] Peking Univ, Beijing, Peoples R China
来源
25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018) | 2018年
基金
美国国家科学基金会;
关键词
D O I
10.14722/ndss.2018.23296
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The prevalent usage of runtime packers has complicated Android malware analysis, as both legitimate and malicious apps are leveraging packing mechanisms to protect themselves against reverse engineer. Although recent efforts have been made to analyze particular packing techniques, little has been done to study the unique characteristics of Android packers. In this paper, we report the first systematic study on mainstream Android packers, in an attempt to understand their security implications. For this purpose, we developed DROIDUNPACK, a whole-system emulation based Android packing analysis framework, which compared with existing tools, relies on intrinsic characteristics of Android runtime (rather than heuristics), and further enables virtual machine inspection to precisely recover hidden code and reveal packing behaviors. Running our tool on 6 major commercial packers, 93,910 Android malware samples and 3 existing state-of-the-art unpackers, we found that not only are commercial packing services abused to encrypt malicious or plagiarized contents, they themselves also introduce security-critical vulnerabilities to the apps being packed. Our study further reveals the prevalence and rapid evolution of custom packers used by malware authors, which cannot be defended against using existing techniques, due to their design weaknesses.
引用
收藏
页数:15
相关论文
共 40 条
[1]  
[Anonymous], 2017, Malware repository
[2]  
[Anonymous], 2016, ValerySoftware McAfee
[3]  
[Anonymous], 2011, USENIX SECURITY S
[4]  
[Anonymous], 2017, CHARGER MALWARE
[5]  
[Anonymous], 2017, IOS code signing
[6]  
[Anonymous], 2016, Android developers blog
[7]  
[Anonymous], 2017, Tencent
[8]  
[Anonymous], 2012, Proceedings of the 19th ACM Conference on Computer and Communications Security, DOI DOI 10.1145/2382196.2382223
[9]  
[Anonymous], 2013, APKPROTECT
[10]  
[Anonymous], 2013, McAfee labs threats report, q4, 2013