GPFinder: Tracking the Invisible in Android Malware - CentraleSupélec Accéder directement au contenu
Communication Dans Un Congrès Année : 2017

GPFinder: Tracking the Invisible in Android Malware

Résumé

Malicious Android applications use clever techniques to hide their real intents from the user and avoid detection by security tools. They resort to code obfuscation and dynamic loading, or wait for special events on the system like reboot or WiFi activation. Therefore, promising approaches aim to locate, study and execute specific parts of Android applications in order to monitor for suspicious behavior. They rely on Control Flow Graphs (CFGs) to obtain execution paths towards sensitive codes. We claim here that these CFGs are incomplete because they do not take into consideration implicit control flow calls, i.e., those that occur when the Android framework calls a method implemented in the application space. This article proposes a practical tool, GPFinder, exposing execution paths towards any piece of code considered as suspicious. GPFinder takes the Android framework into account and considers explicit and implicit control flow calls to build CFGs. Using GPFinder, we give global characteristics of application CFGs by studying a dataset of 14,224 malware and 2,311 goodware samples. We evaluate that 72.69% of the analyzed malicious samples have at least one suspicious method reachable only through implicit calls.
Fichier principal
Vignette du fichier
camera.pdf (296.84 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01584989 , version 1 (11-09-2017)

Identifiants

Citer

Mourad Leslous, Valérie Viet Triem Tong, Jean-François Lalande, Thomas Genet. GPFinder: Tracking the Invisible in Android Malware. 12th International Conference on Malicious and Unwanted Software, Oct 2017, Fajardo, Puerto Rico. pp.39-46, ⟨10.1109/MALWARE.2017.8323955⟩. ⟨hal-01584989⟩
817 Consultations
554 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More