首页> 外文期刊>IEEE transactions on information forensics and security >Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique
【24h】

Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique

机译:通过发展Android恶意软件和动态加载技术来审核反恶意软件工具

获取原文
获取原文并翻译 | 示例
       

摘要

Although a previous paper shows that existing anti-malware tools (AMTs) may have high detection rate, the report is based on existing malware and thus it does not imply that AMTs can effectively deal with future malware. It is desirable to have an alternative way of auditing AMTs. In our previous paper, we use malware samples from android malware collection Genome to summarize a malware meta-model for modularizing the common attack behaviors and evasion techniques in reusable features. We then combine different features with an evolutionary algorithm, in which way we evolve malware for variants. Previous results have shown that the existing AMTs only exhibit detection rate of 20%–30% for 10 000 evolved malware variants. In this paper, based on the modularized attack features, we apply the dynamic code generation and loading techniques to produce malware, so that we can audit the AMTs at runtime. We implement our approach, named Mystique-S, as a service-oriented malware generation system. Mystique-S automatically selects attack features under various user scenarios and delivers the corresponding malicious payloads at runtime. Relying on dynamic code binding (via service) and loading (via reflection) techniques, Mystique-S enables dynamic execution of payloads on user devices at runtime. Experimental results on real-world devices show that existing AMTs are incapable of detecting most of our generated malware. Last, we propose the enhancements for existing AMTs.
机译:尽管先前的文章显示了现有的反恶意软件工具(AMT)可能具有很高的检测率,但是该报告基于现有的恶意软件,因此,这并不意味着AMT可以有效地应对未来的恶意软件。希望有一种替代的方式来审核AMT。在我们之前的文章中,我们使用了来自android恶意软件集合Genome的恶意软件样本来总结一个恶意软件元模型,以将可重复使用功能中的常见攻击行为和规避技术模块化。然后,我们将不同的功能与进化算法结合在一起,以此方式为变体进化恶意软件。先前的结果表明,现有的AMT对10000种进化的恶意软件变种的检测率仅为20%–30%。在本文中,基于模块化攻击功能,我们应用了动态代码生成和加载技术来生成恶意软件,以便我们可以在运行时审核AMT。我们将名为Mystique-S的方法实施为面向服务的恶意软件生成系统。 Mystique-S在各种用户场景下自动选择攻击功能,并在运行时提供相应的恶意负载。依靠动态代码绑定(通过服务)和加载(通过反射)技术,Mystique-S可以在运行时在用户设备上动态执行有效负载。在实际设备上的实验结果表明,现有的AMT无法检测到我们生成的大多数恶意软件。最后,我们建议对现有AMT进行增强。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号