A survey of android application and malware hardening

被引:42
作者
Sihag, Vikas [1 ,2 ]
Vardhan, Manu [2 ]
Singh, Pradeep [2 ]
机构
[1] Sardar Patel Univ Police Secur & Criminal Justice, Jodhpur, Rajasthan, India
[2] Natl Inst Technol, Raipur, Madhya Pradesh, India
关键词
Android; Malware analysis; Code obfuscation; Evasion techniques; CONTROL FLOW OBFUSCATION; CODE OBFUSCATION;
D O I
10.1016/j.cosrev.2021.100365
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the age of increasing mobile and smart connectivity, malware poses an ever evolving threat to individuals, societies and nations. Anti-malware companies are often the first and only line of defense for mobile users. Driven by economic benefits, quantity and complexity of Android malware are increasing, thus making them difficult to detect. Malware authors employ multiple techniques (e.g. code obfuscation, packaging and encryption) to evade static analysis (signature based) and dynamic analysis (behavior based) detection methods. In this article, we present an overview of Android and its state of the art security services. We then present an exhaustive and analytic taxonomy of Android malware hardening techniques available in the literature. Furthermore, we review and analyze the code obfuscation and preventive techniques used by malware to evade detection. Hardening mechanisms are also popular amongst application developers to fortify against reverse engineering. Based on our in-depth survey, we highlight the issues related to them and manifest future directions. We believe the need to examine the effectiveness and efficiency of hardening techniques and their combination. (C) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页数:24
相关论文
共 192 条
[41]  
Bulazel A., 2017, P 1 REVERSING OFFENS, P2
[42]   Inferring the Detection Logic and Evaluating the Effectiveness of Android Anti-Virus Apps [J].
Cai, Zhenquan ;
Yap, Roland H. C. .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :172-182
[43]  
Cappaert J, 2008, LECT NOTES COMPUT SC, V4991, P86
[44]  
Cecilia, 2015, 80 CHIN MOB US ROOT
[45]  
Cesare S., 1999, SECURITY FOCUS
[46]  
Chang H., 2001, ACM CCS 8 WORKSH SEC, P160
[47]   Achieving Accuracy and Scalability Simultaneously in Detecting Application Clones on Android Markets [J].
Chen, Kai ;
Liu, Peng ;
Zhang, Yingjun .
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, :175-186
[48]   Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS [J].
Chen, Kai ;
Wang, Xueqiang ;
Chen, Yi ;
Wang, Peng ;
Lee, Yeonjoon ;
Wang, XiaoFeng ;
Ma, Bin ;
Wang, Aohui ;
Zhang, Yingjun ;
Zou, Wei .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :357-376
[49]  
Chen KevinZhijie., 2013, NDSS
[50]   DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications [J].
Cho, Haehyun ;
Yi, Jeong Hyun ;
Ahn, Gail-Joon .
IEEE ACCESS, 2018, 6 :71229-71240