首页> 外文会议>European Symposium on Research in Computer Security >Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android
【24h】

Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android

机译:MiRAGE:朝着Android的隐身和模块化恶意软件分析沙箱

获取原文

摘要

Nowadays, malware is affecting not only PCs but also mobile devices, which became pervasive in everyday life. Mobile devices can access and store personal information (e.g., location, photos, and messages) and thus are appealing to malware authors. One of the most promising approach to analyze malware is by monitoring its execution in a sandbox (i.e., via dynamic analysis). In particular, most malware sandboxing solutions for Android rely on an emulator, rather than a real device. This motivates malware authors to include runtime checks in order to detect whether the malware is running in a virtualized environment. In that case, the malicious app does not trigger the malicious payload. The presence of differences between real devices and Android emulators started an arms race between security researchers and malware authors, where the former want to hide these differences and the latter try to seek them out. In this paper we present Mirage, a malware sandbox architecture for Android focused on dynamic analysis evasion attacks. We designed the components of Mirage to be extensible via software modules, in order to build specific countermeasures against such attacks. To the best of our knowledge, Mirage is the first modular sandbox architecture that is robust against sandbox detection techniques. As a representative case study, we present a proof of concept implementation of Mirage with a module that tackles evasion attacks based on sensors API return values.
机译:如今,恶意软件不仅影响PC,而且影响了移动设备,在日常生活中变得普遍存在。移动设备可以访问和存储个人信息(例如,位置,照片和消息),从而吸引恶意软件作者。通过在沙箱中监控其在沙箱(即,通过动态分析)中的执行是最有希望的方法之一。特别是,对于Android的大多数恶意软件沙箱解决方案依赖于仿真器,而不是真实的设备。这激励恶意软件作者包括运行时检查,以检测恶意软件是否在虚拟化环境中运行。在这种情况下,恶意应用程序不会触发恶意有效载荷。真实设备和Android仿真器之间的差异存在于安全研究人员和恶意软件作者之间的军备竞赛,前者希望隐藏这些差异,后者试图寻求它们。在本文中,我们呈现MiRAGE,用于Android的恶意软件沙箱架构,专注于动态分析逃避攻击。我们设计了MiRAGE的组件来通过软件模块来扩展,以便构建针对此类攻击的具体对策。据我们所知,海市蜃楼是第一个模块化沙箱架构,对沙箱检测技术具有稳健。作为代表性的案例研究,我们展示了Mirage的概念实施证据,模块基于传感器API返回值解决逃避攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号