Back to Search
Start Over
GPFinder: Tracking the invisible in Android malware
- Source :
- MALWARE, 12th International Conference on Malicious and Unwanted Software, 12th International Conference on Malicious and Unwanted Software, Oct 2017, Fajardo, Puerto Rico. pp.39-46, ⟨10.1109/MALWARE.2017.8323955⟩
- Publication Year :
- 2017
- Publisher :
- IEEE, 2017.
-
Abstract
- International audience; Malicious Android applications use clever techniques to hide their real intents from the user and avoid detection by security tools. They resort to code obfuscation and dynamic loading, or wait for special events on the system like reboot or WiFi activation. Therefore, promising approaches aim to locate, study and execute specific parts of Android applications in order to monitor for suspicious behavior. They rely on Control Flow Graphs (CFGs) to obtain execution paths towards sensitive codes. We claim here that these CFGs are incomplete because they do not take into consideration implicit control flow calls, i.e., those that occur when the Android framework calls a method implemented in the application space. This article proposes a practical tool, GPFinder, exposing execution paths towards any piece of code considered as suspicious. GPFinder takes the Android framework into account and considers explicit and implicit control flow calls to build CFGs. Using GPFinder, we give global characteristics of application CFGs by studying a dataset of 14,224 malware and 2,311 goodware samples. We evaluate that 72.69% of the analyzed malicious samples have at least one suspicious method reachable only through implicit calls.
- Subjects :
- 021110 strategic, defence & security studies
Computer science
0211 other engineering and technologies
020207 software engineering
02 engineering and technology
Special events
Static analysis
Computer security
computer.software_genre
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Control flow
Android malware
0202 electrical engineering, electronic engineering, information engineering
Malware
Android (operating system)
computer
Humanoid robot
Reboot
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- 2017 12th International Conference on Malicious and Unwanted Software (MALWARE)
- Accession number :
- edsair.doi.dedup.....b2e738e01edc64db09af6619e70541a1