首页> 外文会议>International symposium on research in attacks, intrusions and defenses >AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware
【24h】

AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware

机译:AppSpear:用于打包的Android恶意软件的字节码解密和DEX重组

获取原文

摘要

As the techniques for Android malware detection are progressing, malware also fights back through deploying advanced code encryption with the help of Android packers. An effective Android malware detection therefore must take the unpacking issue into consideration to prove the accuracy. Unfortunately, this issue is not easily addressed. Android packers often adopt multiple complex anti-analysis defenses and are evolving frequently. Current unpacking approaches are either based on manual efforts, which are slow and tedious, or based on coarse-grained memory dumping, which are susceptible to a variety of anti-monitoring defenses. This paper conducts a systematic study on existing Android malware which is packed. A thorough investigation on 37,688 Android malware samples is conducted to take statistics of how widespread are those samples protected by Android packers. The anti-analysis techniques of related commercial Android packers are also summarized. Then, we propose AppSpear, a generic and fine-grained system for automatically malware unpacking. Its core technique is a bytecode decrypting and Dalvik executable (DEX) reassembling method, which is able to recover any protected bytecode effectively without the knowledge of the packer. AppSpear directly instruments the Dalvik VM to collect the decrypted bytecode information from the Dalvik Data Struct (DDS), and performs the unpacking by conducting a refined reassembling process to create a new DEX file. The unpacked app is then available for being analyzed by common program analysis tools or malware detection systems. Our experimental evaluation shows that AppSpear could sanitize mainstream Android packers and help detect more malicious behaviors. To the best of our knowledge, AppSpear is the first automatic and generic unpacking system for current commercial Android packers.
机译:随着Android恶意软件检测技术的进步,恶意软件还通过在Android Packers的帮助下部署高级代码加密来进行反击。因此,有效的Android恶意软件检测必须考虑拆包问题以证明准确性。不幸的是,这个问题不容易解决。 Android加壳程序通常采用多种复杂的反分析防御措施,并且在不断发展。当前的拆包方法是基于缓慢而繁琐的手动工作,还是基于容易受到各种反监视防御措施影响的粗粒度内存转储。本文对现有的打包好的Android恶意软件进行了系统的研究。对37,688个Android恶意软件样本进行了彻底的调查,以统计这些样本受Android包装程序保护的程度。还总结了相关商用Android包装工具的抗分析技术。然后,我们提出AppSpear,这是一个通用的,细粒度的系统,用于自动打开恶意软件的包装。它的核心技术是字节码解密和Dalvik可执行文件(DEX)重组方法,该方法能够有效地恢复任何受保护的字节码,而无需打包程序的知识。 AppSpear直接对Dalvik VM进行检测,以从Dalvik数据结构(DDS)收集解密的字节码信息,并通过执行精细的重新组装过程来创建新的DEX文件来执行解压缩。然后,已打开包装的应用程序可用于由通用程序分析工具或恶意软件检测系统进行分析。我们的实验评估表明,AppSpear可以对主流的Android加壳程序进行消毒,并帮助检测更多恶意行为。据我们所知,AppSpear是第一个针对当前商用Android包装商的自动通用包装系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号