Stealth attacks: An extended insight into the obfuscation effects on Android malware

被引:110
|
作者
Maiorca, Davide [1 ]
Ariu, Davide [1 ]
Corona, Igino [1 ]
Aresu, Marco [1 ]
Giacinto, Giorgio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
Android; Malware; Obfuscation; Evasion; DexGuard; Dalvik; Entry points; Signatures; Strings; Bytecode;
D O I
10.1016/j.cose.2015.02.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to effectively evade anti-malware solutions, Android malware authors are progressively resorting to automatic obfuscation strategies. Recent works have shown, on small-scale experiments, the possibility of evading anti-malware engines by applying simple obfuscation transformations on previously detected malware samples. In this paper, we provide a large-scale experiment in which the detection performances of a high number of anti-malware solutions are tested against two different sets of malware samples that have been obfuscated according to different strategies. Moreover, we show that anti-malware engines search for possible malicious content inside assets and entry-point classes. We also provide a temporal analysis of the detection performances of anti-malware engines to verify if their resilience has improved since 2013. Finally, we show how, by manipulating the area of the Android executable that contains the strings used by the application, it is possible to deceive anti-malware engines so that they will identify legitimate samples as malware. On one hand, the attained results show that anti-malware systems have improved their resilience against trivial obfuscation techniques. On the other hand, more complex changes to the application executable have proved to be still effective against detection. Thus, we claim that a deeper static (or dynamic) analysis of the application is needed to improve the robustness of such systems. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:16 / 31
页数:16
相关论文
共 32 条
  • [1] Python']Python and Malware: Developing Stealth and Evasive Malware without Obfuscation
    Koutsokostas, Vasilios
    Patsakis, Constantinos
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 125 - 136
  • [2] Obfusifier: Obfuscation-Resistant Android Malware Detection System
    Li, Zhiqiang
    Sun, Jun
    Yan, Qiben
    Srisa-an, Witawas
    Tsutano, Yutaka
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 214 - 234
  • [3] Lightweight versus obfuscation-resilient malware detection in android applications
    Ali Aghamohammadi
    Fathiyeh Faghih
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 125 - 139
  • [4] Lightweight versus obfuscation-resilient malware detection in android applications
    Aghamohammadi, Ali
    Faghih, Fathiyeh
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (02) : 125 - 139
  • [5] BLADE: Robust malware detection against obfuscation in android
    Sihag, Vikas
    Vardhan, Manu
    Singh, Pradeep
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 38
  • [6] Android Malware Attacks and Countermeasures: Current and Future Directions
    Raveendranath, Rahul
    Rajamani, Venkiteswaran
    Babu, Anoop Joseph
    Datta, Soumya Kanti
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 137 - 143
  • [7] A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead
    Selvaganapathy S.G.
    Sadasivam S.
    Ravi V.
    Journal of Cyber Security and Mobility, 2021, 10 (01): : 177 - 230
  • [8] Towards Obfuscation Resilient Feature Design for Android Malware Detection-KTSODroid
    Khalid, Saneeha
    Hussain, Faisal Bashir
    Gohar, Moneeb
    ELECTRONICS, 2022, 11 (24)
  • [9] Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis
    Bacci, Alessandro
    Bartoli, Alberto
    Martinelli, Fabio
    Medvet, Eric
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 379 - 385
  • [10] DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling
    Ikram, Muhammad
    Beaume, Pierrick
    Kaafar, Mohamed Ali
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 211 - 219