Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware

Zigrid Shehu, Claudio Ciccotelli, Daniele Ucci, Leonardo Aniello, R. Baldoni
{"title":"Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware","authors":"Zigrid Shehu, Claudio Ciccotelli, Daniele Ucci, Leonardo Aniello, R. Baldoni","doi":"10.1109/NGMAST.2016.16","DOIUrl":null,"url":null,"abstract":"App fingerprints can be used to verify whether two apps are the same, and are useful tools for malware detection because they can allow to recognize obfuscated versions of known malware. Fingerprinting an app on the base of static features is known to fail against obfuscation, as it is successful in hiding the static characteristics that reveal the malicious nature of an app. In this paper we propose a novel way to compute app fingerprints, which is based on behavioral features. The aim is to capture the semantics of the app, so that obfuscation results ineffective. The technique we introduce exploits invariants, found among pairs of metrics, collected during app execution, and produces a fingerprint consisting of the list of the correlation values of these pairs. We present an experimental evaluation carried out on a real Android device, whose obtained results support the methodology we propose, and show it can be a viable research direction to investigate further.","PeriodicalId":340716,"journal":{"name":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGMAST.2016.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

App fingerprints can be used to verify whether two apps are the same, and are useful tools for malware detection because they can allow to recognize obfuscated versions of known malware. Fingerprinting an app on the base of static features is known to fail against obfuscation, as it is successful in hiding the static characteristics that reveal the malicious nature of an app. In this paper we propose a novel way to compute app fingerprints, which is based on behavioral features. The aim is to capture the semantics of the app, so that obfuscation results ineffective. The technique we introduce exploits invariants, found among pairs of metrics, collected during app execution, and produces a fingerprint consisting of the list of the correlation values of these pairs. We present an experimental evaluation carried out on a real Android device, whose obtained results support the methodology we propose, and show it can be a viable research direction to investigate further.
基于不变量的应用程序行为指纹检测已知恶意软件的混淆版本
应用程序指纹可以用来验证两个应用程序是否相同,并且是恶意软件检测的有用工具,因为它们可以识别已知恶意软件的混淆版本。众所周知,基于静态特征的应用程序指纹识别无法防止混淆,因为它成功地隐藏了揭示应用程序恶意性质的静态特征。在本文中,我们提出了一种基于行为特征计算应用程序指纹的新方法。其目的是捕获应用程序的语义,以便混淆结果无效。我们介绍的技术利用在应用程序执行期间收集的指标对中发现的不变量,并生成由这些对的相关值列表组成的指纹。我们提出了一个在真实的Android设备上进行的实验评估,其获得的结果支持我们提出的方法,并表明它可以是一个可行的研究方向,以进一步调查。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信