首页> 外文会议>International conference on information security and cryptology >Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
【24h】

Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps

机译:Stegomalware:使用智能手机应用程序中的恶意组件进行捉迷藏

获取原文

摘要

We discuss a class of smartphone malware that uses stegano-graphic techniques to hide malicious executable components within their assets, such as documents, databases, or multimedia files. In contrast with existing obfuscation techniques, many existing information hiding algorithms are demonstrably secure, which would make such stegomalware virtually undetectable by static analysis techniques. We introduce various types of stegomalware attending to the location of the hidden payload and the components required to extract it. We demonstrate its feasibility with a prototype implementation of a stegomalware app that has remained undetected in Google Play so far. We also address the question of whether steganographic capabilities are already being used for malicious purposes. To do this, we introduce a detection system for stegomalware and use it to analyze around 55 K apps retrieved from both malware sources and alternative app markets. Our preliminary results are not conclusive, but reveal that many apps do incorporate steganographic code and that there is a substantial amount of hidden content embedded in app assets.
机译:我们讨论一类智能手机恶意软件,该软件使用隐写图形技术将恶意可执行组件隐藏在其资产中,例如文档,数据库或多媒体文件。与现有的混淆技术相比,许多现有的信息隐藏算法具有明显的安全性,这将使这种隐秘软件实际上无法通过静态分析技术检测到。我们介绍了各种类型的隐身软件,它们与隐藏的有效载荷的位置以及提取隐含载荷所需的组件有关。我们通过一个隐秘软件应用程序的原型实现展示了其可行性,该应用程序到目前为止在Google Play中仍未被发现。我们还解决了隐写功能是否已经用于恶意目的的问题。为此,我们引入了一种针对隐身软件的检测系统,并使用它来分析从恶意软件来源和替代应用程序市场中检索到的大约55 K个应用程序。我们的初步结果尚无定论,但表明许多应用程序确实包含了隐写代码,并且应用程序资产中嵌入了大量隐藏内容。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号