首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks >DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis
【24h】

DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis

机译:Dexlego:重新组装字节码提取,以实现静态分析

获取原文

摘要

The scale of Android applications in the market is growing rapidly. To efficiently detect the malicious behavior in these applications, an array of static analysis tools are proposed. However, static analysis tools suffer from code hiding techniques like packing, dynamic loading, self modifying, and reflection. In this paper, we thus present DexLego, a novel system that performs a reassembleable bytecode extraction for aiding static analysis tools to reveal the malicious behavior of Android applications. DexLego leverages just-in-time collection to extract data and bytecode from an application at runtime, and reassembles them to a new Dalvik Executable (DEX) file offline. The experiments on DroidBench and real-world applications show that DexLego precisely reconstructs the behavior of an application in the reassembled DEX file, and significantly improves analysis result of the existing static analysis systems.
机译:市场中的Android应用程序的规模正在迅速增长。为了有效地检测这些应用程序中的恶意行为,提出了一系列静态分析工具。然而,静态分析工具遭受代码隐藏技术,如包装,动态加载,自我修改和反射。在本文中,我们如图所示,Dexlego是一种新的系统,该系统执行重新组装的字节码提取,以便帮助静态分析工具来揭示Android应用程序的恶意行为。 Dexlego利用即时收集来从运行时从应用程序中提取数据和字节码,并将它们重新组装到脱机的新DALVIK可执行(DEX)文件。 Droidbench和现实世界应用的实验表明,Dexlego精确地重建了重新组装的DEX文件中应用程序的行为,并显着改善了现有静态分析系统的分析结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号