A survey of android application and malware hardening

被引:40
作者
Sihag, Vikas [1 ,2 ]
Vardhan, Manu [2 ]
Singh, Pradeep [2 ]
机构
[1] Sardar Patel Univ Police Secur & Criminal Justice, Jodhpur, Rajasthan, India
[2] Natl Inst Technol, Raipur, Madhya Pradesh, India
关键词
Android; Malware analysis; Code obfuscation; Evasion techniques; CONTROL FLOW OBFUSCATION; CODE OBFUSCATION;
D O I
10.1016/j.cosrev.2021.100365
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the age of increasing mobile and smart connectivity, malware poses an ever evolving threat to individuals, societies and nations. Anti-malware companies are often the first and only line of defense for mobile users. Driven by economic benefits, quantity and complexity of Android malware are increasing, thus making them difficult to detect. Malware authors employ multiple techniques (e.g. code obfuscation, packaging and encryption) to evade static analysis (signature based) and dynamic analysis (behavior based) detection methods. In this article, we present an overview of Android and its state of the art security services. We then present an exhaustive and analytic taxonomy of Android malware hardening techniques available in the literature. Furthermore, we review and analyze the code obfuscation and preventive techniques used by malware to evade detection. Hardening mechanisms are also popular amongst application developers to fortify against reverse engineering. Based on our in-depth survey, we highlight the issues related to them and manifest future directions. We believe the need to examine the effectiveness and efficiency of hardening techniques and their combination. (C) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页数:24
相关论文
共 192 条
  • [1] Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
  • [2] Malware Dynamic Analysis Evasion Techniques: A Survey
    Afianian, Amir
    Niksefat, Salman
    Sadeghiyan, Babak
    Baptiste, David
    [J]. ACM COMPUTING SURVEYS, 2020, 52 (06)
  • [3] Lightweight versus obfuscation-resilient malware detection in android applications
    Aghamohammadi, Ali
    Faghih, Fathiyeh
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (02) : 125 - 139
  • [4] DroidNative: Automating and optimizing detection of Android native code malware variants
    Alam, Shahid
    Qu, Zhengyang
    Riley, Ryan
    Chen, Yan
    Rastogi, Vaibhav
    [J]. COMPUTERS & SECURITY, 2017, 65 : 230 - 246
  • [5] Amamra A, 2012, PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, P79, DOI 10.1109/MALWARE.2012.6461012
  • [6] Amat, 2020, ANDROID MALWARE ANAL
  • [7] Anand A., 2015, INT J COMPUT SCI MOB, V4, P347
  • [8] Android, 2020, ANDR DEV
  • [9] Android, 2018, SEL CONC
  • [10] Android Developer, 2020, DISPLAY