Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks

被引:122
|
作者
Rastogi, Vaibhav [1 ]
Chen, Yan [1 ,2 ]
Jiang, Xuxian [3 ]
机构
[1] Northwestern Univ, Dept Elect Engn & Comp Sci, Evanston, IL 60208 USA
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
Mobile; malware; anti-malware; Android; PAIRWISE STATISTICAL SIGNIFICANCE; SEQUENCE;
D O I
10.1109/TIFS.2013.2290431
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile malware threats (e. g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile malware threats, but also proposing effective, next-generation solutions. We developed DroidChameleon, a systematic framework with various transformation techniques, and used it for our study. Our results on 10 popular commercial anti-malware applications for Android are worrisome: none of these tools is resistant against common malware transformation techniques. In addition, a majority of them can be trivially defeated by applying slight transformation over known malware with little effort for malware authors. Finally, in light of our results, we propose possible remedies for improving the current state of malware detection on mobile devices.
引用
收藏
页码:99 / 108
页数:10
相关论文
empty
未找到相关数据