首页> 外文期刊>Computers & Security >A game of Droid and Mouse: The threat of split-personality malware on Android
【24h】

A game of Droid and Mouse: The threat of split-personality malware on Android

机译:Droid and Mouse游戏:Android上的分裂人格恶意软件的威胁

获取原文
获取原文并翻译 | 示例
           

摘要

In the work at hand, we first demonstrate that Android malware can bypass current automated analysis systems, including AV solutions, mobile sandboxes, and the Google Bouncer. A tool called Sand-Finger allowed us to fingerprint Android-based analysis systems. By analyzing the fingerprints of ten unique analysis environments from different vendors, we were able to find characteristics in which all tested environments differ from actual hardware. Depending on the availability of an analysis system, malware can either behave benignly or load malicious code dynamically at runtime. We also have investigated the widespread of dynamic code loading among benign and malicious apps, and found that malicious apps make use of this technique more often. About one third out of 14,885 malware samples we analyzed was found to dynamically load and execute code. To hide malicious code from analysis, it can be loaded from encrypted assets or via network connections. As we show, however, even dynamic scripts which call existing functions enable an attacker to execute arbitrary code. To demonstrate the effectiveness of both dynamic code and script loading, we create proof-of-concept malware that surpasses up-to-date malware scanners for Android and show that known samples can enter the Google Play Store by modifying them only slightly.
机译:在手头的工作中,我们首先证明Android恶意软件可以绕过当前的自动化分析系统,包括视音频解决方案,移动沙箱和Google Bouncer。名为Sand-Finger的工具使我们能够对基于Android的分析系统进行指纹识别。通过分析来自不同供应商的十个独特分析环境的指纹,我们能够找到所有测试环境与实际硬件都不同的特征。根据分析系统的可用性,恶意软​​件可以表现得很好,也可以在运行时动态加载恶意代码。我们还调查了良性和恶意应用程序中动态代码加载的普遍性,发现恶意应用程序更频繁地使用此技术。我们分析的14,885个恶意软件样本中约有三分之一被发现可以动态加载和执行代码。要从分析中隐藏恶意代码,可以从加密资产或通过网络连接加载恶意代码。但是,正如我们所展示的,即使调用现有功能的动态脚本也使攻击者能够执行任意代码。为了演示动态代码和脚本加载的有效性,我们创建了概念验证型恶意软件,该恶意软件超越了适用于Android的最新恶意软件扫描程序,并表明已知样本只需稍加修改即可进入Google Play商店。

著录项

  • 来源
    《Computers & Security》 |2015年第10期|2-15|共14页
  • 作者单位

    Department of Computer Science, Friedrich-Alexander University Erlangen, Nuernberg, Germany;

    Department of Computer Science, Friedrich-Alexander University Erlangen, Nuernberg, Germany;

    Department of Computer Science, Friedrich-Alexander University Erlangen, Nuernberg, Germany;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Android malware; Dynamic code loading; Dynamic script loading;

    机译:Android恶意软件;动态代码加载;动态脚本加载;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号