首页> 外文会议>International symposium on research in attacks, intrusions and defenses >Poster Abstract: Highlighting Easily How Malicious Applications Corrupt Android Devices
【24h】

Poster Abstract: Highlighting Easily How Malicious Applications Corrupt Android Devices

机译:海报摘要:轻松突出显示恶意应用程序损坏的Android设备

获取原文

摘要

We propose an approach based on information flows to highlight how a malicious application corrupts an Android device. Basic attacks carried on by malicious applications often consist in leaking sensitive data to remote entities. Different works then focused on approaches to detect such attacks by analysing function calls or the access and the use of sensitive data (e.g). However, there exist an other class of attack that threatens the integrity of the system itself or data it contains (e.g modification of the content of sensitive files or installation of new application). Such attacks tend to be overlooked and we propose here an approach to easily detect and highlight them. To highlight these attacks, we first monitor how information from an application under analysis is disseminated in the whole system thanks to an information flow monitor named Blare. Blare monitors information flow between system objects (process, file and socket) at system level and logs observed flow. Prom the log, we build a System Flow Graph that describes the observed flows in a compact format. We then filter the edges of the SFG to only keep odd flows. As Android applications are all built in the same way, they have common behaviours, which means that some information flows they cause are the same (e.g information flow with the system_server process). By removing from the SFG the edges that describe information flows that are also present in SFG of benign applications, we therefore get the suspicious flows that can characterize an attack. We test our approach on 4 pieces of malware publicly known for corrupting Android devices and show that remaining edges of their SFGs describes the attack they are carrying.
机译:我们提出了一种基于信息流的方法,突出显示恶意应用程序如何损坏Android设备。恶意应用程序承载的基本攻击通常包括将敏感数据泄漏到远程实体。然后,不同的作品专注于通过分析函数调用或访问和使用敏感数据(例如)来检测此类攻击的方法。但是,存在另一类攻击,威胁到系统本身的完整性或其包含的数据(例如,修改敏感文件的内容或新应用程序的安装)。这种攻击往往被忽视,我们在此提出了一种容易检测和突出显示它们的方法。为了突出显示这些攻击,我们首先监视在整个系统中如何在分析中传播信息的信息,这归功于名为Blaral的信息流监控器。 BlaRe监视系统对象(流程,文件和插座)之间的信息流程,并观察到流量。 PROM记录,我们构建一个系统流图,描述了以紧凑格式描述的观察到的流程。然后,我们将SFG的边缘过滤到仅保持奇数流。随着Android应用程序的全部以相同的方式构建,它们具有常见的行为,这意味着它们导致的一些信息流相同(例如,使用System_server进程的信息流)。通过从SFG中删除描述的边缘,该边沿在良性应用程序的SFG中存在的信息流,因此我们得到了可以表征攻击的可疑流程。我们在公开为损坏Android设备的公开知名恶意软件上测试我们的方法,并显示其SFG的剩余边缘描述了他们携带的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号