Xiao Chen Thesis

Total Page:16

File Type:pdf, Size:1020Kb

Xiao Chen Thesis Studying the Security Centric Intelligence on Android Malware Detection Xiao Chen A Thesis Submitted in fulfilment of the requirements for the Degree of Doctor of Philosophy Faculty of Science, Engineering and Technology Swinburne University of Technology Australia June 2020 Abstract Android malware detection has long been a critical challenge. Statistic analysis and machine learning based solutions have yielded promising performance on automatic malware detection. However, most existing research works did not consider a real-world issue in malware detection, that is, malware developers may be aware of the detection systems and take countermeasures against the detection approaches. Existing works overlooked this issue and assumed that the detectors are working in a non-adversarial environment, which is not likely to happen in the real world. Recent research in machine learning and deep learning has revealed that learning-based systems are vulnerable to carefully crafted adversarial examples. Extensive efforts have been undertaken to investigate this issue in the computer vision area, but very few works studied its impact on malware detection systems. Actually, adversaries always exist in malware detection/identification tasks. For example, static analysis based malware identification suffers from the code obfuscation problem, which is also a countermeasure the malware authors take to bypass the detection. This thesis presents a study of Android malware detection from both the detector's and the adversary's perspective. Specifically, from the detector's perspective, we analyzed how malware evolves itself. From the adversary's perspective, we studied how malware camouflages itself and evades it from being detected by non-machine-learning and machine-learning-based detectors. ii We firstly carry out a fine-grained and in-depth phylogenetic analysis of malware variants, to study the popular evolution patterns of malware samples. We propose a method that initially clusters malware samples of a family into variant-sets, and then systematically reveals the phylogenetic relationships among those sets for a more in-depth malware evolution analysis. Moreover, we summarise evolutionary patterns that shed light upon how malware samples are evolved to bypass the detection of anti-virus techniques. Such analysis can be of great benefit in understanding newly emerged malware variants and evolution-inspired evasion attacks. Secondly, we propose a novel attacking method that generates adversarial examples of Android malware that can evade being detected by the current detection models. To this end, we propose a method of applying optimal perturbations onto Android APK that can successfully deceive the machine learning detectors. We develop an automated tool to generate the adversarial examples without human intervention. Lastly, we demonstrated to make use of a smartphones built-in voice assistant (VA) to compromise an Android smartphone, while evading the detection of anti-malware techniques. We propose a novel attack approach that crafts the users activation voice by silently listening to users phone calls. Once the activation voice is formed, the attack can select a suitable occasion to launch an attack. The attack embodies a machine learning model that learns proper attacking times to prevent itself from being noticed by the user. By raising awareness, we urge the iii community and manufacturers to revisit the risks of VAs and subsequently revise the activation logic to be resilient to the style of attacks proposed in this work. We believe that by understanding how malware samples are evolved and how adversarial examples are crafted will help researchers and malware analyst to better address the issue of detecting malware in an adversarial environment. iv Acknowledgements I would like to thank my supervisors Prof. Yang Xiang, A/Prof. Jun Zhang and Prof. Wanlei Zhou for their support and patience. I would like to thank my family for their love and understanding. I would like to thank Dr. Sheng Wen for his comments and encouragement. I would like to thank Chaoran, Lihong, Derek, Junchen, for the sleepless we were working together to catch the deadlines. I would like to thank all my friends from Swinburne and Deakin. The climb may be long, but the view is worth it. Xiao Chen July 10, 2019 v Declaration This is to certify that this thesis contains no material which has been accepted for the award of any other degree or diploma and that to the best of my knowledge this thesis contains no material previously published or written by another person except where due reference is made in the text of the thesis. Xiao Chen July 10, 2019 vi To my family. vii Contents Abstract . ii Acknowledgements . v Declaration . vi List of Tables . xiii List of Figures . xv 1 Introduction 1 1.1 Motivations . 1 1.2 Objectives and Contributions . 3 1.3 Thesis Organization . 5 2 Literature Review 6 2.1 Android Security Threats . 6 2.1.1 Malware Types . 8 2.1.2 Malware Penetration Techniques . 10 2.1.3 Malware Obfuscation Techniques . 11 2.2 Android Malware Detection . 12 viii 2.2.1 Static Approaches . 13 2.2.2 Dynamic Approaches . 25 2.3 Android Malware Evasion . 31 2.3.1 Evading Traditional Non-Machine Learning Based Detection 31 2.3.2 Evading Machine Learning Based Detection . 33 2.4 Android Malware Evolution . 38 3 Investigating The Evolution Pattern of Android Malware 43 3.1 Introduction . 44 3.2 Approach . 48 3.2.1 Variant Sets Generation . 48 3.2.2 Formula Construction of the Variant Sets . 53 3.2.3 Phylogenetic Network Construction . 55 3.3 Evaluation . 57 3.3.1 Dataset . 57 3.3.2 Insights Into Variant Clustering . 60 3.3.3 Representativeness of the Variant Formula . 69 3.4 Inspection on Malware Evolution . 71 3.4.1 Phylogenetic Relationship . 71 3.4.2 Evolution Analysis . 75 3.5 Summary . 86 4 Repackaging Malware for Evading Machine-Learning Detection 87 ix 4.1 Introduction . 89 4.2 Android Application Package . 94 4.3 Targeted Systems and Attack Scenarios . 96 4.3.1 MaMaDroid . 96 4.3.2 Drebin . 100 4.3.3 Attack Scenarios . 101 4.4 Attack on MaMaDroid . 102 4.4.1 Attack Algorithm . 102 4.4.2 APK Manipulation . 108 4.4.3 Experiment Settings . 113 4.4.4 Experiment Results . 117 4.5 Attack on Drebin . 124 4.5.1 Attack Algorithm . 124 4.5.2 APK Manipulation . 126 4.5.3 Experiments & Evaluations . 127 4.6 Discussion . 128 4.6.1 Comparison with Existing works . 128 4.6.2 Why We Are Successful . 129 4.6.3 Applicability of Our Attack . 130 4.6.4 Transferability . 131 4.6.5 Artifacts in Our Attack . 133 4.6.6 Defending Methods . 134 x 4.7 Summary . 137 5 A Stealthy Attack on Android phones without Users Awareness 138 5.1 Introduction . 139 5.2 Attacking Model: Vaspy . 144 5.3 Proof-of-Concept: A Spyware . 145 5.3.1 Activation Voice Manipulation . 145 5.3.2 Attacking Environment Sensing . 147 5.3.3 Post Attacks and Spyware Delivery . 151 5.4 Evaluation . 153 5.4.1 Evaluation of the Attacking Environment Sensing Modulel . 153 5.4.2 Evaluation of Real World Attack . 155 5.4.3 Capability of Attack . 162 5.4.4 Runtime Cost Analysis . 164 5.4.5 Resistance to Anti-Virus Tools . 167 5.5 Discussion . 169 5.5.1 Essential Factors for the Successful Attack . 169 5.5.2 Defense Approaches for Vaspy . 170 5.5.3 Lessons from This Work . 171 5.6 Summary . 171 6 Conclusion and Future Works 173 6.1 Conclusion . 173 xi 6.2 Future Works . 175 References 177 xii List of Tables 3.1 Best Silhouette Values Achieved for Malware Families and its Corespondent Distance Threshold . 62 3.2 Malware samples from the same variant set and various labels provided by different Anti-Virus vendors. The malware samples from variant set a is depicted by a0 to an. The Anti-Virus vendors are depicted by v0 to vm. lnm denotes the variant label provided by the vm vendor for the malware an. The variant label lan is unified from the labels given by the different Anti-Virus vendors. 67 3.3 Label Consistency for Four Well-Known Anti-Virus Vendors. The average consistencies are all above 80% with the minimum no less than 50% . 69 4.1 Overview of Drebin feature set . 100 4.2 Attack Scenarios . 117 4.3 Number of features added in each set . 128 4.4 Comparison with existing works (Evasion Rate) . 129 xiii 5.1 Movement intensity Features . 151 5.2 Average Accuracy Performance . 155 5.3 Post attack commands against VAs. 163 xiv List of Figures 3.1 Relationship between a malware family and its variant sets. The malware samples in the same column (colour) share similar code. The malware samples from different columns inside a family perform similar malicious behaviours. 49 3.2 Variant Set Generation Process Overview. 1) A distance matrix will be generated by similarity analysis based on a set of apks from the same malware family by utilizing SimiDroid. 2) By applying the UPGMA clustering algorithm, a malware family dendrogram will be generated representing the hierarchical relationship among malware samples of the family. 3) After the distance threshold is determined, malware samples are them clustered into smaller clades, and each clade represents a variant set. 4 variant sets (a, b, c, d) are generated in the example. 52 3.3 Silhouette and Method-Based Distance Threshold. 54 3.4 Variant sets generation for F akebank and Commplat families . 54 3.5 Formula Construction of the Variant Sets. 55 xv 3.6 Malware Sample Distribution of Six Malware Families From 2008 to 2018. Different malware families have different life cycles. The number of malware samples in opfake, smsagent and autoins increased dramatically in recent years.
Recommended publications
  • AV-TEST Security Report for 2016/2017
    FACTS AND FIGURES SECURITY REPORT The AV-TEST Security Report 2 WINDOWS Security Status 5 macOS Security Status 10 ANDROID Security Status 13 INTERNET THREATS Security Status 16 IoT Security Status 19 2016/17 Test Statistics 22 FACTS AND FIGURES Declining malware statistics It remains positive to note that the declining malware trend in 2016 The AV-TEST provided some relief, at least quantitatively. Thus, compared to 2015, detection systems were required to seek out and defend against 14% fewer Security Report malware samples. In total, this amounted to precisely 11,725,292 fewer newly developed malware programs than in the previous year. It should not be The best news right off the bat: forgotten, however, that the volume of newly developed malware in 2016 still represented the second-highest since the beginning of measurements by Compared to the previous year, the AV-TEST systems. In addition, 2015 saw skyrocketing growth in malware the detection systems of AV-TEST showed programs and in comparison to 2014, practically a doubling of the sample statistics. The overall number of malware programs for all operating systems a slight decline in the development currently exceeds 640 million. of malware programs for the year 2016. Without wanting to belittle the positive trend for 2016, the fact remains that Overall, that is a pleasing trend, however there have been several short-term downward trends since the beginning of by no means any reason to celebrate, measurements in 1984, a total of six times, without seriously influencing the clear, long-term trend – towards more malware. Despite declining numbers, as evidenced by the AV-TEST Institute‘s in 2016, the AV-TEST analysis systems still recorded an average of 350,000 statistics of this year‘s Security Report.
    [Show full text]
  • Global 2000 Bank Secures 9,000 Android Smartphones to Fulfill Internal Compliance Requirements
    CASE STUDY Global 2000 bank secures 9,000 Android smartphones to fulfill internal compliance requirements Customer Profile This financial services firm is based in the middle east, has an international network of 1400 branches globally, and is a member of the Forbes Global 2000 list. Industry: Financial services Mobility Policy: COPE EMM Solution: VMware AirWatch The Solution The Challenge • Lookout Mobile Endpoint Security To enable their Corporate Owned, Personally Enabled (COPE) mobility policy, The Results this leading bank needed a mobile security solution that would comply with their • Achieved compliance with internal internal policy for data protection, integrate with VMware AirWatch, and provide policies for endpoint protection visibility into mobile threats encountered by their international workforce. • Gained visibility into high-risk The IT team decided to implement a COPE mobility policy in order to reduce threats support time by having a limited number of device models and Android versions • Improved employee productivity to maintain. In addition, the bank has developed their own enterprise application with no increase in support tickets that enables their employees to deliver banking services to customers via mobile devices. With no visibility into threats or data leakage on mobile devices, the IT mobility team knew that their unprotected mobile endpoints were an attack surface that presented a major security risk. 1 CASE STUDY The Results Lookout delivers a solution that collects The bank is very happy with how quickly they were able to “ deploy Lookout, including pushing the Lookout For Work app threat data from around the world, and out to 2,000 devices a day towards the end of the process.
    [Show full text]
  • VOL.80 August, 2016 ASEC REPORT VOL.80 August, 2016
    Security Trend ASEC REPORT VOL.80 August, 2016 ASEC REPORT VOL.80 August, 2016 ASEC (AhnLab Security Emergency Response Center) is a global security response group consisting of virus analysts and security experts. This monthly report is published by ASEC and focuses on the most significant security threats and latest security technologies to guard against such threats. For further details, please visit AhnLab, Inc.’s homepage (www. ahnlab.com). SECURITY TREND OF August 2016 Table of Contents 1 01 Malware Statistics 4 02 Web Security Statistics 6 SECURITY STATISTICS 03 Mobile Malware Statistics 7 Ransomware Disguised as PokemonGo to Catch 10 2 Users SECURITY ISSUE Locky Ransomware Disguised as .DLL File 13 3 Appears IN-DEPTH ANALYSIS ASEC REPORT 80 | Security Trend 2 1 SECURITY STATISTICS 01 Malware Statistics 02 Web Security Statistics 03 Mobile Malware Statistics ASEC REPORT 80 | Security Trend SECURITY STATISTICS 01 Malware Statistics According to the ASEC (AhnLab Security Emergency Response Center), 8,793,413 malware were detected in August 2016. The number of detected malware decreased by 955,541 from 9,748,954 detected in the previous month as shown in Figure 1-1. A total of 4,986,496 malware samples were collected in August. 11,000,000 10,000,000 10,467,643 9,748,954 9,000,000 8,793,413 8,000,000 7,000,000 6,000,000 5,000,000 4,000,000 3,000,000 2,000,000 1,000,000 Detected Samples 3,022,206 6,121,096 4,986,496 Collected Samples June July August [Figure 1-1] Malware Trend * “Detected Samples” refers to the number of malware detected by AhnLab products deployed by our customers.
    [Show full text]
  • Android Malware Category and Family Detection and Identification Using Machine Learning
    Android Malware Category and Family Detection and Identification using Machine Learning Ahmed Hashem El Fiky1*, Ayman El Shenawy1, 2, Mohamed Ashraf Madkour1 1 Systems and Computer Engineering Dept., Faculty of Engineering, Al-Azhar University, Cairo, Egypt. 1 Systems and Computer Engineering Dept., Faculty of Engineering, Al-Azhar University, Cairo, Egypt. 2 Software Engineering and Information Technology, Faculty of Engineering and Technology, Egyptian Chinese University, Cairo, Egypt. [email protected] [email protected] [email protected] Abstract: Android malware is one of the most dangerous threats on the internet, and it's been on the rise for several years. Despite significant efforts in detecting and classifying android malware from innocuous android applications, there is still a long way to go. As a result, there is a need to provide a basic understanding of the behavior displayed by the most common Android malware categories and families. Each Android malware family and category has a distinct objective. As a result, it has impacted every corporate area, including healthcare, banking, transportation, government, and e-commerce. In this paper, we presented two machine- learning approaches for Dynamic Analysis of Android Malware: one for detecting and identifying Android Malware Categories and the other for detecting and identifying Android Malware Families, which was accomplished by analyzing a massive malware dataset with 14 prominent malware categories and 180 prominent malware families of CCCS-CIC- AndMal2020 dataset on Dynamic Layers. Our approach achieves in Android Malware Category detection more than 96 % accurate and achieves in Android Malware Family detection more than 99% accurate. Our approach provides a method for high-accuracy Dynamic Analysis of Android Malware while also shortening the time required to analyze smartphone malware.
    [Show full text]
  • Mobile Threat
    Mobile threat February 2018 David Bird FBCS considers threats via mobile devices and explains why he thinks the future may not be so bright. The unprecedented WannaCry ransomware and subsequent Petya destruct-ware outbreaks have caused mayhem internationally. As a result of a remote execution vulnerability, malware has propagated laterally due to two basic root-causes: (a) out-dated operating systems (OS), and/or (b) in-effective patching regimes. Here we have a commonality with the mobile device domain. There are many older generation devices that have different legacy mobile OSes installed that are no longer supported or updated. Legacy connected Microsoft Pocket PC palmtops and Windows CE or Windows Mobile devices are examples of tech still being used by delivery firms and supermarkets; even though they have been end-of-extended support since 2008 and 2014 respectively. So, do we have a problem? With over two and a half billion smartphones globally in 2016, the market is anticipated to reach at least six billion by 2020 due to the convenience of mobile back-end-as-a-service. Apparently, one vulnerability is disclosed every day, in which 10 per cent of those are critical. This figure does not include the number of internet-enabled tablets that are in circulation; in 2015, there were one billion globally, and this is expected to rise to almost one and a half billion by 2018. Today both Android-centric manufacturers and Apple fight for dominance in the mobile device market - squeezing out Blackberry’s enterprise smartphone monopoly. This has resulted in unsupported Blackberry smart-devices persisting in circulation, closely followed by successive versions of Windows Phone OS - with only 10 left supported.
    [Show full text]
  • New Developments in Trojan Virus Engineering Author: Mengze Li ▪ Advisor: Sonja Streuber
    The Wars in Your Machine: New Developments in Trojan Virus Engineering Author: Mengze Li ▪ Advisor: Sonja StreuBer INTRODUCTION THREE NEW TROJANS Definition: Shedun: Android Trojan Cockroach Trojan Polymorphic JavaScript Trojan The Trojan Virus is a malicious computer program that is used to • Runs on Android mobile devices; has been seen pre- • Steals the sensitive data, such as user name, • Spread as email attachments compromise a computer by fooling users about its real intent. installed on cellphones and tablets from China. password, time, date, email, and every key stroke • In different emails, the cipher, string literals • Downloads and installs adware; launches popup and emails the data back to the host. and variable names are different which • Unlike computer viruses, or worms, the Trojan does not directly advertisements • Spread among Windows PCs through USB drives. makes itself less detectable. attack operating systems • Roughly 20,000 popular Android applications • Very hard to detect with anti-virus software. • Meant to be run from disk, which gives it • Modern forms act as a backdoor to grant access without infected (Twitter, Facebook, Snapchat, etc.) permissions to attack system globally. authorization. Analysis • Help attackers to break the confidentiality, integrity and Analysis Analysis availability of data • Can cause a huge impact to both, private users and public organizations, such as exposing the user’s credit card information, or other personal identity information (PII). Method: • Variable names and string literals encoded. • In this study, we are reviewing and analyzing the actual code of three famous modern Trojans in order to learn their most • Transmit target email with Transmit.exe file.
    [Show full text]
  • VOL.78 June, 2016 ASEC REPORT VOL.78 June, 2016
    Security Trend ASEC REPORT VOL.78 June, 2016 ASEC REPORT VOL.78 June, 2016 ASEC (AhnLab Security Emergency Response Center) is a global security response group consisting of virus analysts and security experts. This monthly report is published by ASEC and focuses on the most significant security threats and latest security technologies to guard against such threats. For further details, please visit AhnLab, Inc.’s homepage (www. ahnlab.com). SECURITY TREND OF June 2016 Table of Contents 1 01 Malware Statistics 4 02 Web Security Statistics 6 SECURITY STATISTICS 03 Mobile Malware Statistics 7 2 Cross-platform Adware Appears 10 SECURITY ISSUE 3 Ransomware Using "Malvertising" Plague Users 13 IN-DEPTH ANALYSIS ASEC REPORT 78 | Security Trend 2 1 SECURITY STATISTICS 01 Malware Statistics 02 Web Security Statistics 03 Mobile Malware Statistics ASEC REPORT 78 | Security Trend SECURITY STATISTICS 01 Malware Statistics According to the ASEC (AhnLab Security Emergency Response Center), 10,467,643 malware were detected in June 2016. The number of detected malware decreased by 1,661,954 from 12,129,597 detected in the previous month as shown in Figure 1-1. A total of 3,022,206 malware samples were collected in June. 40,000,000 30,000,000 20,000,000 12,129,597 11,564,967 10,467,643 10,000,000 6,000,000 5,000,000 4,000,000 3,000,000 2,000,000 1,000,000 Detected Samples 3,245,837 2,957,212 3,022,206 Collected Samples April May June [Figure 1-1] Malware Trend * “Detected Samples” refers to the number of malware detected by AhnLab products deployed by our customers.
    [Show full text]
  • TMMS 9.8 with IBM Maas360 Integration
    TMMS 9.8 with IBM MaaS360 Integration November 1, 2018 Mobile Threat Landscape Copyright 2013 Trend Micro Inc. 2 Over 29 Million Malicious Android App Detected by Trend Micro as of Sep. 2018 3 Copyright 2017 Trend Micro Inc. Top Five Android Malware of 2018 (Jan. – Sep.) Name Percentage Description Mostly distributed as pornography applications. Collects privacy information including phone number, device id, sim Shedun 37.49% serials number and so on. Install backdoor on the device and for device administrator privilege. Pretend as a porn player and download other malicious Rootnik 12.41% applications. It also gains root access to devices. Without user’s awareness or authorization, accept command from remote C&C server and execute related operation. Fobus 7.18% Intercept or abort SMS. Collects and leaks users privacy information including phone number, imei, device id etc. Automatically send out SMS without user's authorization or Smssender 4.31% knowledge. Collects user’s privacy information including phone number. Sends SMS to subscribe to premium services without user’s SmsPay 2.47% consents. Collects and leaks users privacy information 4 Copyright 2017 Trend Micro Inc. including phone number and location. Unique Mobile Ransomware Detected by Trend Micro • Huge spike is caused by SLocker family. • SLocker locks screen or encrypts filesC Mobile Ransomware Types on Android Lock Screen File Encryption PIN Hijack Copyright 2013 Trend Micro Inc. 6 Mobile Ransomware Demand Payment iOS Malware Detected from Apple App Store (Jan. – Sep. 2018) Name Count Description Uploads device and app information to a malicious central XcodeGhost 18 server, creates fake iCloud password login prompts, read and write from the copy-and-paste clipboard Setup a backdoor to attackers and executes malicious iBackDoor 17 command Abuses private APIs in order to collect more personal Youmi 2 information, including a list of installel apps, serial numbers and user's Apple ID email address etc.
    [Show full text]
  • Cyber Security Newsletter
    Monthly Newsletter July 2016 Mobile Devices and Malware In This Issue Introduction The past few years have seen a tremendous increase Introduction in the use of mobile devices. This is partly due to devices becoming more affordable, but the real What is Malware? reason is convenience. Mobile devices have Are Mobile Devices increased in speed, power and storage space, making them more convenient than carrying around a Vulnerable? laptop. This has led to a rise in people using them Dangers to for online shopping, managing their finances, paying Businesses their bills, etc. While this is convenient for users, it also exposes them, and potentially where they work, How to protect to multiple threats. yourself Mobile devices have become so numerous that in the latter half of 2013 there were more mobile devices accessing the internet than traditional computers. Today it is almost impossible to find someone who doesn’t have a smartphone. And several people have iPhone Malware tablets, smart watches, and/or more than one smart phone. Because of this, mobile iPhone virus devices have become a target for cybercriminals and malware. Wirelurker Apple Malware What is Malware? As you may remember from May’s newsletter, malware is a compound word derived from combining Malicious and Software. Basically it is a program that has been written to Android Malware perform a malicious act. Examples of malware are viruses, worms, adware, ransomware, Stagefright etc. So why does malware work on one computer and not another? The answer to that is because the malware has to be written to work on a specific operating system or computer Fake Apps hardware.
    [Show full text]
  • AV Test Security Report 2017/2018
    FACTS AND FIGURES SECURITY REPORT The AV-TEST Security Report 2 Security Status WINDOWS 6 Breakthrough of CRYPTO MINERS 11 Security Status macOS 14 Security Status ANDROID 16 Security Status INTERNET THREATS 20 Security Status IoT 23 2017/18 Test Statistics 26 FACTS AND FIGURES Malware development on a high level The AV-TEST For the year 2016, the detection systems registered declining numbers for newly developed malware, and the AV-TEST Institute predicted this trend also Security Report for the subsequent year. And it proved correct, as documented by the 2017 statistics: Last year as well, the number of newly developed malware samples remained below the numbers of the previous year – at least in the first three The number of newly developed malware quarters. In total, this decline is indeed quantifiable, but does not represent a programs remains at a consistently high level. significant change. Whereas in the year 2016, at total of 127,473,381 new malware samples were discovered, in 2017 the total still reached 121,661,167. But the stagnation registered since 2016 is The speed at which new malware is developed, and to which security systems deceiving, as it only allows for quantitative have to respond, thus declined slightly from 4.0 to 3.9 malware programs per second. statements concerning the risk status. Statements as to the dangerousness of malware Trend: malware development has doubled in circulation, as well as the damage inflicted, Since 2017, this development, however, has experienced a dramatic swing in are not reflected in these measured values. It is the opposite direction: Since October of last year, the detection systems of here, however, where the prospects are not as the AV-TEST Institute have registered practically a doubling of the monthly rates of new malware development.
    [Show full text]
  • JITANA: a Modern Hybrid Program Analysis Framework for Android Platforms
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering, Department CSE Journal Articles of 2019 JITANA: A modern hybrid program analysis framework for android platforms Yutaka Tsutano Shakthi Bachala Witawas Srisa-an Gregg Rothermel Jackson Dinh Follow this and additional works at: https://digitalcommons.unl.edu/csearticles Part of the Computer and Systems Architecture Commons, and the Systems and Communications Commons This Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in CSE Journal Articles by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. digitalcommons.unl.edu JITANA: A modern hybrid program analysis framework for Android platforms Yutaka Tsutano, Shakthi Bachala, Witawas Srisa-an, Gregg Rothermel, Jackson Dinh Department of Computer Science and Engineering, University of Nebraska-Lincoln, Lincoln, NE, 68588, USA Corresponding author — Witawas Srisa-an, email [email protected] Email addresses — [email protected] (Y. Tsutano), [email protected] (S. Bachala), [email protected] (G. Rothermel), [email protected] (J. Dinh). Abstract Security vetting of Android apps is often performed under tight time constraints (e.g., a few minutes). As such, vetting activities must be performed “at speed”, when an app is submitted for distribution or a device is analyzed for malware. Existing static and dynamic program analysis approaches are not feasible for use in secu- rity analysis tools because they require a much longer time to operate than secu- rity analysts can afford. There are two factors that limit the performance and effi- ciency of current analysis approaches.
    [Show full text]
  • REPORT VOL.85 January, 2017 ASEC REPORT VOL.85 January, 2017
    Security Trend ASEC REPORT VOL.85 January, 2017 ASEC REPORT VOL.85 January, 2017 ASEC (AhnLab Security Emergency Response Center) is a global security response group consisting of virus analysts and security experts. This monthly report is published by ASEC and focuses on the most significant security threats and latest security technologies to guard against such threats. For further details, please visit AhnLab, Inc.’s homepage (www. ahnlab.com). SECURITY TREND OF January 2017 Table of Contents 1 01 Malware Statistics 4 02 Web Security Statistics 6 SECURITY STATISTICS 03 Mobile Malware Statistics 7 2 A New Type Of Ransomware Launching DDoS Attack 10 SECURITY ISSUE 3 Evolving Ransomware Attack Patterns 13 IN-DEPTH ANALYSIS ASEC REPORT 85 | Security Trend 2 1 SECURITY STATISTICS 01 Malware Statistics 02 Web Security Statistics 03 Mobile Malware Statistics ASEC REPORT 85 | Security Trend SECURITY STATISTICS 01 Malware Statistics According to the ASEC (AhnLab Security Emergency Response Center), 5,993,659 malware were detected in January 2017. The number of detected malware decreased by 944,375 from 6,938,034 detected in the previous month as shown in Figure 1-1. A total of 4,962,372 malware samples were collected in January. 11,000,000 10,000,000 9,000,000 8,651,224 8,000,000 6,938,034 7,000,000 5,993,659 6,000,000 5,000,000 4,590,540 4,692,745 4,962,372 4,000,000 3,000,000 2,000,000 1,000,000 Detected Samples Collected Samples 0 November December January [Figure 1-1] Malware Trend * “Detected Samples” refers to the number of malware detected by AhnLab products deployed by our customers.
    [Show full text]