Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices

被引:1
作者
Irolla, Paul [1 ]
Filiol, Eric [1 ]
机构
[1] Ecole Ingn Monde Numer ESIEA, Lab Cryptol & Virol Operat, CVO Lab, 38 Rue Docteurs Calmette & Guerin, F-53000 Laval, France
来源
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY | 2017年
关键词
Dynamic Analysis; Android; Malware Detection; Automatic Testing;
D O I
10.5220/0006094006100621
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android is the most widely used smartphone OS with 82.8% market share in 2015 (IDC, 2015). It is therefore the most widely targeted system by malware authors. Researchers rely on dynamic analysis to extract malware behaviors and often use emulators to do so. However, using emulators lead to new issues. Malware may detect emulation and as a result it does not execute the payload to prevent the analysis. Dealing with virtual device evasion is a never-ending war and comes with a non-negligible computation cost (Lindorfer et al., 2014). To overcome this state of affairs, we propose a system that does not use virtual devices for analysing malware behavior. Glassbox is a functional prototype for the dynamic analysis of malware applications. It executes applications on real devices in a monitored and controlled environment. It is a fully automated system that installs, tests and extracts features from the application for further analysis. We present the architecture of the platform and we compare it with existing Android dynamic analysis platforms. Lastly, we evaluate the capacity of Glassbox to trigger application behaviors by measuring the average coverage of basic blocks on the AndroCoverage dataset (AndroCoverage, 2016). We show that it executes on average 13.52% more basic blocks than the Monkey program.
引用
收藏
页码:610 / 621
页数:12
相关论文
共 29 条
[1]   Identifying Android malware using dynamically obtained features [J].
Afonso, Vitor Monte ;
de Amorim, Matheus Favero ;
Abed Gregio, Andre Ricardo ;
Junquera, Glauco Barroso ;
de Geus, Paulo Licio .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01) :9-17
[2]  
[Anonymous], 2015, NDSS
[3]  
[Anonymous], HIDING BEHIND ART
[4]  
[Anonymous], 2012, ANDROID SECURITY
[5]  
[Anonymous], 2013, Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY)
[6]  
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[7]  
Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
[8]  
Canfora G., 2015, P 3 INT WORKSH SOFTW, P13
[9]   Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection [J].
Canfora, Gerardo ;
Medvet, Eric ;
Mercaldo, Francesco ;
Visaggio, Corrado Aaron .
IWSPA'16: PROCEEDINGS OF THE 2016 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2016, :50-57
[10]   Automated Test Input Generation for Android: Are We There Yet? [J].
Choudhary, Shauvik Roy ;
Gorla, Alessandra ;
Orso, Alessandro .
2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2015, :429-440