• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

RiskRanker: Scalable and accurate zero-day Android malware detection. In MobiSys, (2012)

by M Grace, Y Zhou, Q Zhang, S Zou, X Jiang
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 72
Next 10 →

DroidChameleon: Evaluating Android Anti-malware against Transformation Attacks

by Vaibhav Rastogi, Yan Chen, Xuxian Jiang
"... Mobile malware threats (e.g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluati ..."
Abstract - Cited by 30 (3 self) - Add to MetaCart
Mobile malware threats (e.g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile malware threats but also proposing effective, next-generation solutions. We developed DroidChameleon, a systematic framework with various transformation techniques, and used it for our study. Our results on ten popular commercial anti-malware applications for Android are worrisome: none of these tools is resistant against common malware transformation techniques. Moreover, the transformations are simple in most cases and anti-malware tools make little effort to provide transformation-resilient detection. Finally, in the light of our results, we propose possible remedies for improving the current state of malware detection on mobile devices.
(Show Context)

Citation Context

... tools on Android, these approaches cannot directly apply to these tools presently. Smartphone Malware Research. Many works have been done towards discovery and characterization of smartphone malware =-=[7, 15, 20, 23, 24, 29, 30]-=-. Our work is distinct from these as we try to evaluate the efficacy of existing tools against transformed malware. 8. CONCLUSION We evaluated ten anti-malware products on Android for their resilience...

WHYPER: Towards Automating Risk Assessment of Mobile Applications

by Rahul P, Xusheng Xiao, Wei Yang, William Enck, Tao Xie
"... Application markets such as Apple’s App Store and Google’s Play Store have played an important role in the popularity of smartphones and mobile devices. However, keeping malware out of application markets is an ongoing challenge. While recent work has developed various techniques to determine what a ..."
Abstract - Cited by 28 (3 self) - Add to MetaCart
Application markets such as Apple’s App Store and Google’s Play Store have played an important role in the popularity of smartphones and mobile devices. However, keeping malware out of application markets is an ongoing challenge. While recent work has developed various techniques to determine what applications do, no work has provided a technical approach to answer, what do users expect? In this paper, we present the first step in addressing this challenge. Specifically, we focus on permissions for a given application and examine whether the application description provides any indication for why the application needs a permission. We present WHY-PER, a framework using Natural Language Processing (NLP) techniques to identify sentences that describe the need for a given permission in an application description. WHYPER achieves an average precision of 82.8%, and an average recall of 81.5 % for three permissions (address book, calendar, and record audio) that protect frequentlyused security and privacy sensitive resources. These results demonstrate great promise in using NLP techniques to bridge the semantic gap between user expectations and application functionality, further aiding the risk assessment of mobile applications. 1

Detecting Passive Content Leaks and Pollution in Android Applications

by Yajin Zhou, Xuxian Jiang - In Proceedings of the 20th Annual Symposium on Network and Distributed System Security, NDSS ’13 , 2013
"... In this paper, we systematically study two vulnerabili-ties and their presence in existing Android applications (or “apps”). These two vulnerabilities are rooted in an unpro-tected Android component, i.e., content provider, inside vul-nerable apps. Because of the lack of necessary access con-trol en ..."
Abstract - Cited by 24 (3 self) - Add to MetaCart
In this paper, we systematically study two vulnerabili-ties and their presence in existing Android applications (or “apps”). These two vulnerabilities are rooted in an unpro-tected Android component, i.e., content provider, inside vul-nerable apps. Because of the lack of necessary access con-trol enforcement, affected apps can be exploited to either passively disclose various types of private in-app data or inadvertently manipulate certain security-sensitive in-app settings or configurations that may subsequently cause se-rious system-wide side effects (e.g., blocking all incoming phone calls or SMS messages). To assess the prevalence of these two vulnerabilities, we analyze 62, 519 apps collected in February 2012 from various Android markets. Our re-sults show that among these apps, 1, 279 (2.0%) and 871 (1.4%) of them are susceptible to these two vulnerabilities, respectively. In addition, we find that 435 (0.7%) and 398 (0.6%) of them are accessible from official Google Play and some of them are extremely popular with more than 10, 000, 000 installs. The presence of a large number of vulnerable apps in popular Android markets as well as the variety of private data for leaks and manipulation reflect the severity of these two vulnerabilities. To address them, we also explore and examine possible mitigation solutions. 1
(Show Context)

Citation Context

...request additional permissions beyond their normal functionalities. DroidMOSS [43] and PiggyApp [42] aim to detect repackaged apps in existing mobile app marketplaces. DroidRanger [45] and RiskRanker =-=[28]-=- are two systems that are designed to detect malicious apps in existing Android markets. MalGenome [44] reports a relatively large collection of Android malware and presents various characteristics of...

Vetting undesirable behaviors in android apps with permission use analysis

by Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, X. Sean, Wang Binyu Zang - In CCS , 2013
"... Android platform adopts permissions to protect sensitive resources from untrusted apps. However, after permissions are granted by users at install time, apps could use these permissions (sensitive resources) with no further restrictions. Thus, recent years have witnessed the explosion of undesirable ..."
Abstract - Cited by 20 (2 self) - Add to MetaCart
Android platform adopts permissions to protect sensitive resources from untrusted apps. However, after permissions are granted by users at install time, apps could use these permissions (sensitive resources) with no further restrictions. Thus, recent years have witnessed the explosion of undesirable behaviors in Android apps. An important part in the defense is the accurate analysis of Android apps. However, traditional syscall-based analysis techniques are not well-suited for Android, because they could not capture critical interactions between the application and the Android system. This paper presents VetDroid, a dynamic analysis platform for reconstructing sensitive behaviors in Android apps from a novel permission use perspective. VetDroid features a systematic frame-work to effectively construct permission use behaviors, i.e., how applications use permissions to access (sensitive) system resources, and how these acquired permission-sensitive resources are further utilized by the application. With permission use behaviors, security analysts can easily examine the internal sensitive behaviors of an app. Using real-world Android malware, we show that VetDroid can clearly reconstruct fine-grained malicious behaviors to ease malware analysis. We further apply VetDroid to 1,249 top free apps in Google Play. VetDroid can assist in finding more information leaks than TaintDroid [24], a state-of-the-art technique. In addition, we show howwe can use VetDroid to analyze fine-grained causes of information leaks that TaintDroid cannot reveal. Finally, we show that VetDroid can help identify subtle vulnerabilities in some (top free) applications otherwise hard to detect.
(Show Context)

Citation Context

...problems of Android’s special permission mechanism and programming model untouched. A survey on current Android malware characteristics was presented in [59] and [29]. DroidRanger [60] and RiskRanker =-=[36]-=- were two Android malware detectors that relied on existing knowledge about malicious symptoms. Although they were reported to detect known and unknownmalware samples, they do not analyze the fine-gra...

Automatic and Scalable Fault Detection for Mobile Applications

by Lenin Ravindranath, Suman Nath, Jitendra Padhye, Hari Balakrishnan
"... This paper describes the design, implementation, and evaluation of VanarSena, an automated fault finder for mobile applications (“apps”). The techniques in VanarSena are driven by a study of 25 million real-world crash reports of Windows Phone apps reported in 2012. Our analysis indicates that a mod ..."
Abstract - Cited by 19 (5 self) - Add to MetaCart
This paper describes the design, implementation, and evaluation of VanarSena, an automated fault finder for mobile applications (“apps”). The techniques in VanarSena are driven by a study of 25 million real-world crash reports of Windows Phone apps reported in 2012. Our analysis indicates that a modest number of root causes are responsible for many observed failures, but that they occur in a wide range of places in an app, requiring a wide coverage of possible execution paths. VanarSena adopts a “greybox ” testing method, instrumenting the app binary to achieve both coverage and speed. VanarSena runs on cloud servers: the developer uploads the app binary; VanarSena then runs several app “monkeys” in parallel to emulate user, network, and sensor data behavior, returning a detailed report of crashes and failures. We have tested VanarSena with 3000 apps from the Windows Phone store, finding that 1138 of them had failures; VanarSena uncovered 2969 distinct bugs in existing apps, including 1227 that were not previously reported. Because we anticipate VanarSena being used in regular regression tests, testing speed is important. VanarSena uses a “hit testing ” method to quickly emulate an app by identifying which user interface controls map to the same execution handlers in the code. This feature is a key benefit of VanarSena’s greybox philosophy. 1
(Show Context)

Citation Context

...tatic and dynamic analysis of mobile apps. Several prior works have statically analyzed app binaries to uncover energy bugs [35, 39], performance problems [28], app plagiarism [12], security problems =-=[16, 21]-=-, and privacy leaks [30, 18]. Static analysis is not suitable for our goal of uncovering runtime faults of apps since it cannot capture runtime issues such as poor network condition and corrupted or u...

Drebin: Effective and explainable detection of android malware in your pocket

by Daniel Arp, Michael Spreitzenbarth, Hugo Gascon, Konrad Rieck , 2014
"... Malicious applications pose a threat to the security of the Android platform. The growing amount and diversity of these applications render conventional defenses largely ineffective and thus Android smartphones often remain un-protected from novel malware. In this paper, we propose DREBIN, a lightwe ..."
Abstract - Cited by 18 (0 self) - Add to MetaCart
Malicious applications pose a threat to the security of the Android platform. The growing amount and diversity of these applications render conventional defenses largely ineffective and thus Android smartphones often remain un-protected from novel malware. In this paper, we propose DREBIN, a lightweight method for detection of Android malware that enables identifying malicious applications di-rectly on the smartphone. As the limited resources impede monitoring applications at run-time, DREBIN performs a broad static analysis, gathering as many features of an ap-plication as possible. These features are embedded in a joint vector space, such that typical patterns indicative for malware can be automatically identified and used for ex-plaining the decisions of our method. In an evaluation with 123,453 applications and 5,560 malware samples DREBIN outperforms several related approaches and detects 94% of the malware with few false alarms, where the explana-tions provided for each detection reveal relevant properties of the detected malware. On five popular smartphones, the method requires 10 seconds for an analysis on average, ren-dering it suitable for checking downloaded applications di-rectly on the device. 1
(Show Context)

Citation Context

...vity, run-time monitoring suffers from a significant overhead and can not be directly applied on mobile devices. By contrast, static analysis methods, such as Kirin [13], Stowaway [15] and RiskRanker =-=[21]-=-, usually induce only a small run-time overhead. While these approaches are efficient and scalable, they mainly build on manually crafted detection patterns which are often not available for new malwa...

Contextual Policy Enforcement in Android Applications with Permission Event Graphs

by Kevin Zhijie Chen, Noah Johnson, Shuaifu Dai, Kyle Macnamara, Tom Magrino, Edward Wu, Martin Rinard, Dawn Song
"... The difference between a malicious and a benign Android application can often be characterised by context and sequence in which certain permissions and APIs are used. We present a new technique for checking temporal properties of the interaction between an application and the Android event system. O ..."
Abstract - Cited by 15 (0 self) - Add to MetaCart
The difference between a malicious and a benign Android application can often be characterised by context and sequence in which certain permissions and APIs are used. We present a new technique for checking temporal properties of the interaction between an application and the Android event system. Our tool can automatically detect sensitive operations being performed without the user’s consent, such as recording audio after the stop button is pressed, or accessing an address book in the background. Our work centres around a new abstraction of Android applications, called a Permission Event Graph, which we construct with static analysis, and query using model checking. We evaluate application-independent properties on 152 malicious and 117 benign applications, and application-specific properties on 8 benign and 9 malicious applications. In both cases, we can detect, or prove the absence of malicious behaviour beyond the reach of existing techniques. 1
(Show Context)

Citation Context

...yknow that the application uses audio and SD card permissions. Since control-flow between the Android system and event-handlers is not represented in a call graph, structural analysis of call graphs =-=[12, 23]-=-, will not identify the behaviours discussed above. The challenge in checking temporal properties is to construct an abstraction satisfying two requirements: It must be small enough for model checking...

Apposcopy: Semantics-Based Detection of Android Malware through Static Analysis∗

by Yu Feng, Saswat Anand, Isil Dillig, Alex Aiken
"... We present Apposcopy, a new semantics-based approach for identifying a prevalent class of Android malware that steals private user information. Apposcopy incorporates (i) a high-level language for specifying signatures that describe seman-tic characteristics of malware families and (ii) a static ana ..."
Abstract - Cited by 14 (4 self) - Add to MetaCart
We present Apposcopy, a new semantics-based approach for identifying a prevalent class of Android malware that steals private user information. Apposcopy incorporates (i) a high-level language for specifying signatures that describe seman-tic characteristics of malware families and (ii) a static anal-ysis for deciding if a given application matches a malware signature. The signature matching algorithm of Apposcopy uses a combination of static taint analysis and a new form of program representation called Inter-Component Call Graph to efficiently detect Android applications that have certain control- and data-flow properties. We have evaluated Ap-poscopy on a corpus of real-world Android applications and show that it can effectively and reliably pinpoint malicious applications that belong to certain malware families.
(Show Context)

Citation Context

...oaches, including Apposcopy, is that they can only detect instances of known malware families. In contrast, zero-day malware detectors try to uncover unknown malware families. For example, RiskRanker =-=[24]-=- performs several risk analyses to rank Android applications as high-, medium-, or low-risk. These risk analyses include techniques to identify suspicious code that exploits platformlevel vulnerabilit...

A Measurement Study of Google Play

by Nicolas Viennot, Edward Garcia, Jason Nieh
"... Although millions of users download and use third-party Android applications from the Google Play store, little information is known on an aggregated level about these applications. We have built PlayDrone, the first scalable Google Play store crawler, and used it to index and analyze over 1,100,000 ..."
Abstract - Cited by 13 (1 self) - Add to MetaCart
Although millions of users download and use third-party Android applications from the Google Play store, little information is known on an aggregated level about these applications. We have built PlayDrone, the first scalable Google Play store crawler, and used it to index and analyze over 1,100,000 applications in the Google Play store on a daily basis, the largest such index of Android applications. PlayDrone leverages various hacking techniques to circumvent Google’s roadblocks for indexing Google Play store content, and makes proprietary application sources available, including source code for over 880,000 free applications. We demonstrate the usefulness of PlayDrone in decompiling and analyzing application content by exploring four previously unaddressed issues: the characterization of Google Play application content at large scale and its evolution over time, library usage in applications and its impact on application portability, duplicative application content in Google Play, and the ineffectiveness of OAuth and related service authentication mechanisms resulting in malicious users being able to easily gain unauthorized access to user data and resources on Amazon Web Services and Facebook.
(Show Context)

Citation Context

...ocused on the security of Android applications and the presence of malware in Google Play, but this work has focused on possible compromises of user data and privacy on the Android devices themselves =-=[20, 22, 25, 44]-=-. While PlayDrone can be used as a tool to enable similar studies, we show how PlayDrone can be used to analyze a completely different type of security threat. By simply analyzing Android application ...

The impact of vendor customizations on Android security

by Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang - In ACM conference on Computer and communications security (CCS ’13 , 2013
"... The smartphone market has grown explosively in recent years, as more and more consumers are attracted to the sensor-studded mul-tipurpose devices. Android is particularly ascendant; as an open platform, smartphone manufacturers are free to extend and modify it, allowing them to differentiate themsel ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
The smartphone market has grown explosively in recent years, as more and more consumers are attracted to the sensor-studded mul-tipurpose devices. Android is particularly ascendant; as an open platform, smartphone manufacturers are free to extend and modify it, allowing them to differentiate themselves from their competitors. However, vendor customizations will inherently impact overall An-droid security and such impact is still largely unknown. In this paper, we analyze ten representative stock Android im-ages from five popular smartphone vendors (with two models from each vendor). Our goal is to assess the extent of security issues that may be introduced from vendor customizations and further de-termine how the situation is evolving over time. In particular, we take a three-stage process: First, given a smartphone’s stock im-age, we perform provenance analysis to classify each app in the
(Show Context)

Citation Context

...lnerability Analysis Several works have attempted to survey the landscape of malware on Android (e.g., MalGenome [51]) as well as general apps [15, 38]. Other works, like DroidRanger [53], RiskRanker =-=[25]-=-, Peng et al. [37] and MAST [7] all have been concerned with finding malicious apps in app markets that contain a large number of benign apps. DroidScope [48] uses virtualization to perform semantic v...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University