首页> 外文会议>Annual IEEE/IFIP International Conference on Dependable Systems and Networks >DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis
【24h】

DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis

机译:DexLego:可重组字节码提取以帮助进行静态分析

获取原文

摘要

The scale of Android applications in the market is growing rapidly. To efficiently detect the malicious behavior in these applications, an array of static analysis tools are proposed. However, static analysis tools suffer from code hiding techniques like packing, dynamic loading, self modifying, and reflection. In this paper, we thus present DexLego, a novel system that performs a reassembleable bytecode extraction for aiding static analysis tools to reveal the malicious behavior of Android applications. DexLego leverages just-in-time collection to extract data and bytecode from an application at runtime, and reassembles them to a new Dalvik Executable (DEX) file offline. The experiments on DroidBench and real-world applications show that DexLego precisely reconstructs the behavior of an application in the reassembled DEX file, and significantly improves analysis result of the existing static analysis systems.
机译:Android应用程序在市场中的规模正在迅速增长。为了有效地检测这些应用程序中的恶意行为,提出了一系列静态分析工具。但是,静态分析工具受代码隐藏技术(例如打包,动态加载,自修改和反射)的困扰。因此,在本文中,我们介绍了一种新颖的系统DexLego,该系统执行可重新组装的字节码提取以帮助静态分析工具揭示Android应用程序的恶意行为。 DexLego利用实时收集在运行时从应用程序中提取数据和字节码,然后将它们重新组合为离线的新Dalvik可执行文件(DEX)。在DroidBench和实际应用程序上进行的实验表明,DexLego在重新组装的DEX文件中精确地重构了应用程序的行为,并显着改善了现有静态分析系统的分析结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号