首页> 外文会议>IEEE Symposium on Security and Privacy >Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS
【24h】

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS

机译:跟随魔鬼的足迹:Android和iOS上潜在有害库的跨平台分析

获取原文

摘要

It is reported recently that legitimate libraries are repackaged for propagating malware. An in-depth analysis of such potentially-harmful libraries (PhaLibs), however, has never been done before, due to the challenges in identifying those libraries whose code can be unavailable online (e.g., removed from the public repositories, spreading underground, etc.). Particularly, for an iOS app, the library it integrates cannot be trivially recovered from its binary code and cannot be analyzed by any publicly available anti-virus (AV) systems. In this paper, we report the first systematic study on PhaLibs across Android and iOS, based upon a key observation that many iOS libraries have Android versions that can potentially be used to understand their behaviors and the relations between the libraries on both sides. To this end, we utilize a methodology that first clusters similar packages from a large number of popular Android apps to identify libraries, and strategically analyze them using AV systems to find PhaLibs. Those libraries are then used to search for their iOS counterparts within Apple apps based upon the invariant features shared cross platforms. On each discovered iOS PhaLib, our approach further identifies its suspicious behaviors that also appear on its Android version and uses the AV system on the Android side to confirm that it is indeed potentially harmful. Running our methodology on 1.3 million Android apps and 140,000 popular iOS apps downloaded from 8 markets, we discovered 117 PhaLibs with 1008 variations on Android and 23 PhaLibs with 706 variations on iOS. Altogether, the Android PhaLibs is found to infect 6.84% of Google Play apps and the iOS libraries are embedded within thousands of iOS apps, 2.94% among those from the official Apple App Store. Looking into the behaviors of the PhaLibs, not only do we discover the recently reported suspicious iOS libraries such as mobiSage, but also their Android counterparts and 6 other back-door libraries never known before. Those libraries are found to contain risky behaviors such as reading from their host apps' keychain, stealthily recording audio and video and even attempting to make phone calls. Our research shows that most Android-side harmful behaviors have been preserved on their corresponding iOS libraries, and further identifies new evidence about libraries repackaging for harmful code propagations on both sides.
机译:最近有报道说,合法库被重新打包以传播恶意软件。但是,由于在识别那些无法在线获取其代码(例如,从公共存储库中删除,在地下传播等)的库时遇到了挑战,因此从未对这种潜在有害的库(PhaLib)进行过深入的分析。 )。特别是,对于iOS应用程序,其集成的库无法从其二进制代码中轻松恢复,也无法通过任何公共可用的防病毒(AV)系统进行分析。在本文中,我们基于一项重要的观察结果,报告了针对Android和iOS上的PhaLib的首次系统研究,该观察结果表明,许多iOS库具有Android版本,可用于了解其行为以及双方库之间的关系。为此,我们利用一种方法,首先将来自大量流行的Android应用程序的类似软件包进行聚类,以识别库,然后使用AV系统从战略上分析它们,以找到PhaLib。然后,这些库可用于基于跨平台共享的不变功能在Apple应用程序中搜索与它们对应的iOS。在发现的每个iOS PhaLib上,我们的方法还可以识别其可疑行为,这些可疑行为也出现在其Android版本上,并在Android方面使用AV系统来确认它确实具有潜在危害。在从8个市场下载的130万个Android应用程序和140,000个流行的iOS应用程序上运行我们的方法,我们发现117种PhaLibs(在Android上具有1008个版本)和23种PhaLibs(在iOS上具有706个版本)。总共发现,Android PhaLibs感染了6.84%的Google Play应用程序,并且iOS库已嵌入数千种iOS应用程序中,其中2.94%来自官方的Apple App Store。通过查看PhaLib的行为,我们不仅发现了最近报道的可疑iOS库(例如mobiSage),还发现了它们的Android对应库以及其他6个从未有过的后门库。发现这些库包含危险的行为,例如从其主机应用程序的钥匙串中读取,秘密地录制音频和视频,甚至尝试拨打电话。我们的研究表明,大多数Android端的有害行为已保留在其相应的iOS库中,并进一步确定了有关库重新打包以进行双方有害代码传播的新证据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号