首页> 外文期刊>The Journal of Systems and Software >StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications
【24h】

StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications

机译:StanDARD:在android应用程序的安全性分析中解决动态代码更新的问题

获取原文
获取原文并翻译 | 示例
       

摘要

Dynamic code update techniques (Android Studio - support for dynamic delivery), such as dynamic class loading and reflection, enable Android apps to extend their functionality at runtime. At the same time, these techniques are misused by malware developers to transform a seemingly benign app into a malware, once installed on a real device. Among the corpus of evasive techniques used in modern real-world malware, evasive usage of dynamic code updates plays a key role.First, we demonstrate the ineffectiveness of existing tools to analyze apps in the presence of dynamic code updates using our test apps, i.e., Reflection-Bench and InboxArchiver. Second, we present StaDART, combining static and dynamic analysis of Android apps to reveal the concealed behavior of malware. StaDART performs dynamic code interposition using a vtable tampering technique for API hooking to avoid modifications to the Android framework. Furthermore, we integrate it with a triggering solution, DroidBot, to make it more scalable and fully automated. We present our evaluation results with a dataset of 2000 real world apps; containing 1000 legitimate apps and 1000 malware samples. The evaluation results with this dataset and Reflection-Bench show that StaDART reveals suspicious behavior that is otherwise hidden to static analysis tools. (C) 2019 Published by Elsevier Inc.
机译:动态代码更新技术(Android Studio-支持动态交付),例如动态类加载和反射,使Android应用程序可以在运行时扩展其功能。同时,一旦安装在真实设备上,恶意软件开发人员就会滥用这些技术,将看似良性的应用程序转换为恶意软件。在现代现实世界恶意软件中使用的规避技术中,对动态代码更新的规避使用起着关键作用。首先,我们演示了在使用我们的测试应用程序进行动态代码更新的情况下,现有工具无法有效地分析应用程序,即,Reflection-Bench和InboxArchiver。其次,我们展示StaDART,结合了Android应用程序的静态和动态分析,以揭示恶意软件的隐藏行为。 StaDART使用vtable篡改技术执行动态代码插入,以进行API挂钩,以避免修改Android框架。此外,我们将其与触发解决方案DroidBot集成在一起,以使其具有更高的可扩展性和全自动性。我们用2000个真实应用程序的数据集展示了评估结果;包含1000个合法应用和1000个恶意软件样本。该数据集和Reflection-Bench的评估结果表明,StaDART揭示了可疑行为,而静态分析工具则隐藏了这些可疑行为。 (C)2019由Elsevier Inc.发布

著录项

  • 来源
    《The Journal of Systems and Software》 |2020年第1期|110386.1-110386.13|共13页
  • 作者单位

    Univ Trento Trento Italy|Univ Trento Malware & Program Anal Android OS & Applicat Usin Trento Italy|Katholieke Univ Leuven Leuven Belgium|Univ Torino Turin Italy|Hamad Bin Khalifa Univ Doha Qatar;

    Univ Trento Trento Italy|Katholieke Univ Leuven Leuven Belgium|Univ Torino Turin Italy|Hamad Bin Khalifa Univ Doha Qatar;

    Univ Trento Trento Italy|Katholieke Univ Leuven Dept Comp Sci Leuven Belgium|Univ Torino Turin Italy|Hamad Bin Khalifa Univ Doha Qatar;

    Univ Trento Secur Res Grp Trento Italy|Katholieke Univ Leuven Leuven Belgium|Univ Torino Turin Italy|Hamad Bin Khalifa Univ Doha Qatar;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Android; Dynamic code updates; Reflection; Dynamic class loading; Security analysis;

    机译:Android;动态代码更新;反射;动态类加载;安全分析;
  • 入库时间 2022-08-18 04:51:39

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号