首页> 外文期刊>Computers & Security >Stealth attacks: An extended insight into the obfuscation effects on Android malware
【24h】

Stealth attacks: An extended insight into the obfuscation effects on Android malware

机译:隐形攻击:深入了解混淆对Android恶意软件的影响

获取原文
获取原文并翻译 | 示例

摘要

In order to effectively evade anti-malware solutions, Android malware authors are progressively resorting to automatic obfuscation strategies. Recent works have shown, on small-scale experiments, the possibility of evading anti-malware engines by applying simple obfuscation transformations on previously detected malware samples. In this paper, we provide a large-scale experiment in which the detection performances of a high number of anti-malware solutions are tested against two different sets of malware samples that have been obfuscated according to different strategies. Moreover, we show that anti-malware engines search for possible malicious content inside assets and entry-point classes. We also provide a temporal analysis of the detection performances of anti-malware engines to verify if their resilience has improved since 2013. Finally, we show how, by manipulating the area of the Android executable that contains the strings used by the application, it is possible to deceive anti-malware engines so that they will identify legitimate samples as malware. On one hand, the attained results show that anti-malware systems have improved their resilience against trivial obfuscation techniques. On the other hand, more complex changes to the application executable have proved to be still effective against detection. Thus, we claim that a deeper static (or dynamic) analysis of the application is needed to improve the robustness of such systems.
机译:为了有效规避反恶意软件解决方案,Android恶意软件作者正逐渐采用自动混淆策略。最近的工作在小型实验中显示了通过对先前检测到的恶意软件样本进行简单的混淆转换来逃避反恶意软件引擎的可能性。在本文中,我们提供了一个大规模实验,其中针对两种已根据不同策略进行混淆的恶意软件样本集,对大量反恶意软件解决方案的检测性能进行了测试。此外,我们证明了反恶意软件引擎会在资产和入口点类中搜索可能的恶意内容。我们还提供了反恶意软件引擎检测性能的时间分析,以验证自2013年以来它们的弹性是否有所提高。最后,我们展示了如何通过操纵包含应用程序使用的字符串的Android可执行文件的区域,来实现可能欺骗反恶意软件引擎,以便它们将合法样本识别为恶意软件。一方面,获得的结果表明,反恶意软件系统提高了其对琐碎混淆技术的适应性。另一方面,事实证明,对应用程序可执行文件进行更复杂的更改仍然可以有效地阻止检测。因此,我们声称需要对应用程序进行更深入的静态(或动态)分析,以提高此类系统的鲁棒性。

著录项

  • 来源
    《Computers & Security》 |2015年第6期|16-31|共16页
  • 作者单位

    Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d'Armi, 09123, Cagliari, Italy;

    Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d'Armi, 09123, Cagliari, Italy;

    Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d'Armi, 09123, Cagliari, Italy;

    Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d'Armi, 09123, Cagliari, Italy;

    Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d'Armi, 09123, Cagliari, Italy;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Android; Malware; Obfuscation; Evasion; DexGuard; Dalvik; Entry points; Signatures; Strings; Bytecode;

    机译:Android;恶意软件;混淆;逃避;DexGuard;达尔维克入口点;签名;弦;字节码;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号