Stealth attacks: An extended insight into the obfuscation effects on Android malware

被引:110
|
作者
Maiorca, Davide [1 ]
Ariu, Davide [1 ]
Corona, Igino [1 ]
Aresu, Marco [1 ]
Giacinto, Giorgio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, I-09123 Cagliari, Italy
关键词
Android; Malware; Obfuscation; Evasion; DexGuard; Dalvik; Entry points; Signatures; Strings; Bytecode;
D O I
10.1016/j.cose.2015.02.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to effectively evade anti-malware solutions, Android malware authors are progressively resorting to automatic obfuscation strategies. Recent works have shown, on small-scale experiments, the possibility of evading anti-malware engines by applying simple obfuscation transformations on previously detected malware samples. In this paper, we provide a large-scale experiment in which the detection performances of a high number of anti-malware solutions are tested against two different sets of malware samples that have been obfuscated according to different strategies. Moreover, we show that anti-malware engines search for possible malicious content inside assets and entry-point classes. We also provide a temporal analysis of the detection performances of anti-malware engines to verify if their resilience has improved since 2013. Finally, we show how, by manipulating the area of the Android executable that contains the strings used by the application, it is possible to deceive anti-malware engines so that they will identify legitimate samples as malware. On one hand, the attained results show that anti-malware systems have improved their resilience against trivial obfuscation techniques. On the other hand, more complex changes to the application executable have proved to be still effective against detection. Thus, we claim that a deeper static (or dynamic) analysis of the application is needed to improve the robustness of such systems. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:16 / 31
页数:16
相关论文
共 32 条
  • [11] Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)
    Jusoh, Rosmalissa
    Firdaus, Ahmad
    Anwar, Shahid
    Osman, Mohd Zamri
    Darmawan, Mohd Faaizie
    Ab Razak, Mohd Faizal
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 54
  • [12] Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware
    Garcia, Joshua
    Hammad, Mahmoud
    Malek, Sam
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 497 - 497
  • [13] Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware
    Garcia, Joshua
    Hammad, Mahmoud
    Malek, Sam
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2018, 26 (03)
  • [14] AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning
    Jiang, Yu
    Li, Ruixuan
    Tang, Junwei
    Davanian, Ali
    Yin, Heng
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 242 - 253
  • [15] On the evaluation of android malware detectors against code-obfuscation techniques
    Nawaz, Umair
    Aleem, Muhammad
    Lin, Jerry Chun-Wei
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [16] A Defensive Strategy Against Android Adversarial Malware Attacks
    Atedjio, Fabrice Setephin
    Lienou, Jean-Pierre
    Nelson, Frederica F.
    Shetty, Sachin S.
    Kamhoua, Charles A.
    IEEE ACCESS, 2024, 12 : 169432 - 169441
  • [17] Utilizing obfuscation information in deep learning-based Android malware detection
    Wu, Junji
    Kanai, Atsushi
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 1321 - 1326
  • [18] Light up that Droid! On the effectiveness of static analysis features against app obfuscation for Android malware detection
    Molina-Coronado, Borja
    Ruggia, Antonio
    Mori, Usue
    Merlo, Alessio
    Mendiburu, Alexander
    Miguel-Alonso, Jose
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 235
  • [19] DroidEnemy: Battling adversarial example attacks for Android malware detection
    Bala, Neha
    Ahmar, Aemun
    Li, Wenjia
    Tovar, Fernanda
    Battu, Arpit
    Bambarkar, Prachi
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (06) : 1040 - 1047
  • [20] Android malware obfuscation variants detection method based on multi-granularity opcode features
    Tang, Junwei
    Li, Ruixuan
    Jiang, Yu
    Gu, Xiwu
    Li, Yuhua
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 129 : 141 - 151