首页> 外文学位 >Repackaged Smartphone Applications: Threats and Defenses.
【24h】

Repackaged Smartphone Applications: Threats and Defenses.

机译:重新包装的智能手机应用程序:威胁和防御。

获取原文
获取原文并翻译 | 示例

摘要

Smartphone applications are rapidly growing in number and variety. These applications (or apps), typically organized in various app markets, can be conveniently browsed by users and simply tapped to install on a variety of mobile devices. In studying smartphone apps in these markets, we find a common "in-the-wild" practice of repackaging legitimate apps. This practice brings tremendous risks to app developers, mobile users, market operators, and the entire ecosystem. For example, malicious authors may attach destructive payloads to legitimate apps to infect unsuspecting users. Others may implant advertising code into popular apps to hijack ad revenue. To better understand the extent and threats of repackaged smartphone apps, we conduct two systematic studies. First, we implement an app similarity measurement system called DroidMOSS that applies fuzzy hashing technique to effectively localize and detect changes from app-repackaging behavior. Using DroidMOSS, we conduct an initial sampling-based study on apps from six popular third-party markets. The study reveals a worrisome fact that 5% to 13% of apps in these markets are repackaged apps. Further investigation indicates that these repackaged apps are mainly used to replace existing inapp advertisements or embed new ones to hijack ad revenues. There are also cases where malicious payloads are implanted. Not relying on sampling, the second study deals with all apps from the markets. Specifically, we employ a fast and scalable approach to detect piggybacked apps (the most serious category of repackaged apps). Realizing that attached payloads are not integral part of apps' primary functionality, we propose module decoupling technique to partition apps into primary and non-primary modules. Observing that piggybacked app shares the same primary module as the original app, we develop a fingerprinting technique to extract meaningful semantic features into feature vector. We then construct a metric space and propose a fast search algorithm to efficiently and scalably detect piggybacked apps. A prototype named PiggyApp is implemented to study 84, 767 apps collected from various markets. Results show the processing takes less than nine hours on a single machine and piggybacked apps constitute between 0.97% and 2.7% of all apps for these markets. Further investigation reveals a series of advertising libraries inserted into thousands of apps and a variety of malicious payloads implanted into dozens of apps. These results demonstrate the effectiveness and scalability of our approach. To defend against app repackaging threat, we explore two different approaches. First, we propose a watermarking mechanism for Android apps as a deterrence mechanism. To embed and extract watermark automatically, we introduce manifest app, which can trigger different app functionality to exhibit the watermark within an extended Dalvik VM. The extracted watermark can be used as the proof of app ownership when repackaged app is identified. The second approach uses diversified intermediate languages (other than Dalvik bytecode) to ship the code for various apps. Not knowing the instruction semantic, attackers will have difficulty in making meaningful modifications to the target app. To reduce performance overhead, we devise a lightweight in-app hooking mechanism to reuse Dalvik VM to interpret the new instructions. To eliminate developer's intervention, we develop an automatic process to transform normal apps into protected form. To demonstrate the effectiveness of these two methods in defending against app repackaging, we analyze their robustness in resisting well-known attacks, and evaluated them against available tools. Evaluations show that both approaches introduce a small performance overhead adequate for daily usage.
机译:智能手机应用程序的数量和种类正在迅速增长。通常可以在各种应用程序市场中组织的这些应用程序(或多个应用程序),用户可以方便地浏览它们,并只需轻按以安装在各种移动设备上即可。在研究这些市场的智能手机应用程序时,我们发现了重新包装合法应用程序的常见“疯狂”做法。这种做法给应用程序开发人员,移动用户,市场运营商以及整个生态系统带来了巨大的风险。例如,恶意作者可能将破坏性有效载荷附加到合法应用程序上,以感染毫无戒心的用户。其他人可能会将广告代码植入流行的应用中,以劫持广告收入。为了更好地了解重新包装的智能手机应用程序的范围和威胁,我们进行了两项系统的研究。首先,我们实现一个名为DroidMOSS的应用程序相似性测量系统,该系统应用模糊哈希技术有效地定位和检测应用程序重新包装行为中的更改。使用DroidMOSS,我们对来自六个受欢迎的第三方市场的应用程序进行了基于样本的初始研究。该研究揭示了一个令人担忧的事实,即这些市场中5%至13%的应用程序是重新打包的应用程序。进一步的调查表明,这些重新打包的应用程序主要用于替换现有的应用程序内广告或嵌入新的广告,以劫持广告收入。在某些情况下,还会植入恶意有效载荷。第二项研究不依赖抽样,而是针对市场上的所有应用。具体来说,我们采用了一种快速且可扩展的方法来检测搭载的应用程序(最严重的重新打包应用程序类别)。考虑到附加的负载不是应用程序主要功能的组成部分,我们建议使用模块解耦技术将应用程序分为主要模块和非主要模块。观察到搭载的应用程序与原始应用程序共享相同的主要模块,我们开发了一种指纹识别技术,以将有意义的语义特征提取到特征向量中。然后,我们构建一个度量空间,并提出一种快速搜索算法,以高效,可扩展地检测搭载的应用。实施了一个名为PiggyApp的原型,以研究从各个市场收集的84、767个应用程序。结果显示,在一台机器上处理时间不到9个小时,搭载这些应用的应用占这些市场所有应用的0.97%至2.7%。进一步的调查显示,一系列广告库已插入数千个应用程序中,并且各种恶意负载已植入数十个应用程序中。这些结果证明了我们方法的有效性和可扩展性。为了防御应用程序重新打包的威胁,我们探索了两种不同的方法。首先,我们为Android应用程序提出了一种加水印机制,以作为一种威慑机制。为了自动嵌入和提取水印,我们引入了清单应用程序,它可以触发不同的应用程序功能以在扩展的Dalvik VM中显示水印。识别出重新打包的应用程序后,提取的水印可用作应用程序所有权的证明。第二种方法使用多种中间语言(Dalvik字节码除外)来为各种应用程序分发代码。攻击者不知道指令的语义,将难以对目标应用进行有意义的修改。为了减少性能开销,我们设计了一种轻量级的应用程序内挂钩机制,以重用Dalvik VM来解释新指令。为了消除开发人员的干预,我们开发了一种自动流程,可以将正常的应用程序转换为受保护的形式。为了证明这两种方法在防范应用程序重新打包方面的有效性,我们分析了它们在抵御知名攻击方面的鲁棒性,并根据可用工具对其进行了评估。评估表明,这两种方法都会带来很小的性能开销,足以满足日常使用。

著录项

  • 作者

    Zhou, Wu.;

  • 作者单位

    North Carolina State University.;

  • 授予单位 North Carolina State University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2013
  • 页码 117 p.
  • 总页数 117
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号