Rage against the virtual machine: hindering dynamic analysis of Android malware

Thanasis Petsas, Giannis Voyatzis, E. Athanasopoulos, M. Polychronakis, S. Ioannidis
{"title":"Rage against the virtual machine: hindering dynamic analysis of Android malware","authors":"Thanasis Petsas, Giannis Voyatzis, E. Athanasopoulos, M. Polychronakis, S. Ioannidis","doi":"10.1145/2592791.2592796","DOIUrl":null,"url":null,"abstract":"Antivirus companies, mobile application marketplaces, and the security research community, employ techniques based on dynamic code analysis to detect and analyze mobile malware. In this paper, we present a broad range of anti-analysis techniques that malware can employ to evade dynamic analysis in emulated Android environments. Our detection heuristics span three different categories based on (i) static properties, (ii) dynamic sensor information, and (iii) VM-related intricacies of the Android Emulator. To assess the effectiveness of our techniques, we incorporated them in real malware samples and submitted them to publicly available Android dynamic analysis systems, with alarming results. We found all tools and services to be vulnerable to most of our evasion techniques. Even trivial techniques, such as checking the value of the IMEI, are enough to evade some of the existing dynamic analysis frameworks. We propose possible countermeasures to improve the resistance of current dynamic analysis tools against evasion attempts.","PeriodicalId":302603,"journal":{"name":"European Workshop on System Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"237","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Workshop on System Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2592791.2592796","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 237

Abstract

Antivirus companies, mobile application marketplaces, and the security research community, employ techniques based on dynamic code analysis to detect and analyze mobile malware. In this paper, we present a broad range of anti-analysis techniques that malware can employ to evade dynamic analysis in emulated Android environments. Our detection heuristics span three different categories based on (i) static properties, (ii) dynamic sensor information, and (iii) VM-related intricacies of the Android Emulator. To assess the effectiveness of our techniques, we incorporated them in real malware samples and submitted them to publicly available Android dynamic analysis systems, with alarming results. We found all tools and services to be vulnerable to most of our evasion techniques. Even trivial techniques, such as checking the value of the IMEI, are enough to evade some of the existing dynamic analysis frameworks. We propose possible countermeasures to improve the resistance of current dynamic analysis tools against evasion attempts.
怒斥虚拟机:阻碍Android恶意软件动态分析
反病毒公司、移动应用程序市场和安全研究社区采用基于动态代码分析的技术来检测和分析移动恶意软件。在本文中,我们提出了广泛的反分析技术,恶意软件可以利用这些技术来逃避模拟Android环境中的动态分析。我们的检测启发式跨越三个不同的类别,基于(i)静态属性,(ii)动态传感器信息,和(iii) Android模拟器的虚拟机相关的复杂性。为了评估我们的技术的有效性,我们将它们纳入了真实的恶意软件样本,并将它们提交给公开可用的Android动态分析系统,结果令人震惊。我们发现所有工具和服务都容易受到我们大多数规避技术的攻击。即使是微不足道的技术,比如检查IMEI的值,也足以避开一些现有的动态分析框架。我们提出了可能的对策,以提高当前动态分析工具对逃避企图的抵抗力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信