Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 11/2019

06.08.2019 | Research Article - Computer Engineering and Computer Science

A Deep Camouflage: Evaluating Android’s Anti-malware Systems Robustness Against Hybridization of Obfuscation Techniques with Injection Attacks

verfasst von: Khaled Bakour, Halil Murat Ünver, Razan Ghanem

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 11/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The threats facing smartphones have become one of the most dangerous cyberspace threats; therefore, many solutions have been developed in the commercial or academic domain to address these threats. This paper aims to test the defence robustness of some well-known commercial anti-malware systems against camouflage techniques. To this end, multiple attacks have been proposed and applied to create multiple camouflaged malware datasets based on well-known malware datasets. First of all, we proposed two injection attacks, namely benign permissions injection attack and benign permissions-code injection attack; these attacks have been used with one more attack called app re-signing attack. To the best of our knowledge, these injection attacks have been used for the first time in the Android OS domain. Furthermore, the proposed attacks have been hybridized with some commonly used obfuscation techniques, namely string encryption, class encryption, and reflection, to obtain a high degree of camouflage and avoiding anti-malware systems’ detection. To our knowledge, this is the first time that the obfuscation techniques are hybridized with other attacks. The obtained results showed that the detection accuracy of most tested anti-malware systems dropped to about 10% or less. Moreover, the average number of engines which was able to detect malware samples decreased from 45 engines when the original dataset has been tested to about 12 engines when the camouflaged datasets have been tested.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
17.
Zurück zum Zitat Liang, S.; Du, X.: Permission-combination-based scheme for android mobile malware detection. In: IEEE International Conference on Communications (ICC), 2014, IEEE. Liang, S.; Du, X.: Permission-combination-based scheme for android mobile malware detection. In: IEEE International Conference on Communications (ICC), 2014, IEEE.
21.
Zurück zum Zitat Altaher, A.; BaRukab, O.: Android malware classification based on ANFIS with fuzzy c-means clustering using significant application permissions. Turk. J. Electr. Eng. Comput. Sci. 25(3), 2232–2242 (2017)CrossRef Altaher, A.; BaRukab, O.: Android malware classification based on ANFIS with fuzzy c-means clustering using significant application permissions. Turk. J. Electr. Eng. Comput. Sci. 25(3), 2232–2242 (2017)CrossRef
22.
Zurück zum Zitat Sharma, K.; Gupta, B.: Mitigation and risk factor analysis of android applications. Comput. Electr. Eng. 71, 416–430 (2018)CrossRef Sharma, K.; Gupta, B.: Mitigation and risk factor analysis of android applications. Comput. Electr. Eng. 71, 416–430 (2018)CrossRef
26.
Zurück zum Zitat Sen, S.; Aysan, A.I.; Clark, J.A.: SAFEDroid: using structural features for detecting android malwares. In: Security and Privacy in Communication Networks. 2018. Springer, Cham Sen, S.; Aysan, A.I.; Clark, J.A.: SAFEDroid: using structural features for detecting android malwares. In: Security and Privacy in Communication Networks. 2018. Springer, Cham
29.
Zurück zum Zitat Sanz, B.; et al.: On the automatic categorisation of android applications. In: Consumer Communications and Networking Conference (CCNC), 2012 IEEE Sanz, B.; et al.: On the automatic categorisation of android applications. In: Consumer Communications and Networking Conference (CCNC), 2012 IEEE
32.
Zurück zum Zitat Rastogi, V.; Chen, Y.; Enck, W.: AppsPlayground: automatic security analysis of smartphone applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. 2013. ACM. Rastogi, V.; Chen, Y.; Enck, W.: AppsPlayground: automatic security analysis of smartphone applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. 2013. ACM.
37.
Zurück zum Zitat Zhang, Y.; Luo, X.; Yin, H.: Dexhunter: toward extracting hidden code from packed android applications. In: European Symposium on Research in Computer Security. Springer, Berlin (2015) Zhang, Y.; Luo, X.; Yin, H.: Dexhunter: toward extracting hidden code from packed android applications. In: European Symposium on Research in Computer Security. Springer, Berlin (2015)
38.
Zurück zum Zitat Li, L.; et al.: Droidra: taming reflection to support whole-program analysis of android apps. In: Proceedings of the 25th International Symposium on Software Testing and Analysis. ACM, Cambridge (2016) Li, L.; et al.: Droidra: taming reflection to support whole-program analysis of android apps. In: Proceedings of the 25th International Symposium on Software Testing and Analysis. ACM, Cambridge (2016)
39.
Zurück zum Zitat Zheng, M.; Lee, P.P.; Lui, J.C.: ADAM: an automatic and extensible platform to stress test android anti-virus systems. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, Berlin (2012) Zheng, M.; Lee, P.P.; Lui, J.C.: ADAM: an automatic and extensible platform to stress test android anti-virus systems. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, Berlin (2012)
40.
Zurück zum Zitat Rastogi, V.; Chen, Y.; Jiang, X.: Droidchameleon: evaluating android anti-malware against transformation attacks. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, Cambridge (2013) Rastogi, V.; Chen, Y.; Jiang, X.: Droidchameleon: evaluating android anti-malware against transformation attacks. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, Cambridge (2013)
42.
Zurück zum Zitat Rastogi, S.; Bhushan, K.; Gupta, B.: Android applications repackaging detection techniques for smartphone devices. Procedia Comput. Sci. 78, 26–32 (2016)CrossRef Rastogi, S.; Bhushan, K.; Gupta, B.: Android applications repackaging detection techniques for smartphone devices. Procedia Comput. Sci. 78, 26–32 (2016)CrossRef
43.
Zurück zum Zitat Huang, H.; et al.: A framework for evaluating mobile app repackaging detection algorithms. In: International Conference on Trust and Trustworthy Computing. Springer, Berlin (2013) Huang, H.; et al.: A framework for evaluating mobile app repackaging detection algorithms. In: International Conference on Trust and Trustworthy Computing. Springer, Berlin (2013)
44.
Zurück zum Zitat Gupta, S.; Gupta, B.B.: JS-SAN: defense mechanism for HTML5-based web applications against JavaScript code injection vulnerabilities. Secur. Commun. Netw. 9(11), 1477–1495 (2016)CrossRef Gupta, S.; Gupta, B.B.: JS-SAN: defense mechanism for HTML5-based web applications against JavaScript code injection vulnerabilities. Secur. Commun. Netw. 9(11), 1477–1495 (2016)CrossRef
45.
Zurück zum Zitat Chaudhary, P.; Gupta, S.; Gupta, B.B.: Auditing defense against XSS worms in online social network-based web applications. In: Handbook Research on Modern Cryptographic Solutions for Computer and Cyber Security, pp. 216–245. IGI Global (2016) Chaudhary, P.; Gupta, S.; Gupta, B.B.: Auditing defense against XSS worms in online social network-based web applications. In: Handbook Research on Modern Cryptographic Solutions for Computer and Cyber Security, pp. 216–245. IGI Global (2016)
46.
Zurück zum Zitat Gupta, B.B., Soni, H.; Siwan, P.; Kumar, A.; Gupta S.: DOM‐guard: defeating DOM based injection of XSS worms in HTML5 web applications on Mobile based cloud platforms. In: Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, pp 425–453 (2018) Gupta, B.B., Soni, H.; Siwan, P.; Kumar, A.; Gupta S.: DOM‐guard: defeating DOM based injection of XSS worms in HTML5 web applications on Mobile based cloud platforms. In: Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, pp 425–453 (2018)
47.
Zurück zum Zitat Arp, D.; et al.: Drebin: effective and explainable detection of android malware in your pocket. In: Ndss (2014) Arp, D.; et al.: Drebin: effective and explainable detection of android malware in your pocket. In: Ndss (2014)
48.
Zurück zum Zitat Zhou, Y.; Jiang, X.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy (SP), IEEE (2012) Zhou, Y.; Jiang, X.: Dissecting android malware: characterization and evolution. In: IEEE Symposium on Security and Privacy (SP), IEEE (2012)
Metadaten
Titel
A Deep Camouflage: Evaluating Android’s Anti-malware Systems Robustness Against Hybridization of Obfuscation Techniques with Injection Attacks
verfasst von
Khaled Bakour
Halil Murat Ünver
Razan Ghanem
Publikationsdatum
06.08.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 11/2019
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-019-04081-5

Weitere Artikel der Ausgabe 11/2019

Arabian Journal for Science and Engineering 11/2019 Zur Ausgabe

Research Article - Computer Engineering and Computer Science

An Optimal Codebook for Content-Based Image Retrieval in JPEG Compressed Domain

Research Article - Computer Engineering and Computer Science

Diacritics Effect on Arabic Speech Recognition

Research Article - Computer Engineering and Computer Science

Bayesian Versus Convolutional Networks for Arabic Handwriting Recognition

Review - Computer Engineering and Computer Science

Framework for Agile Development Using Cloud Computing: A Survey

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.