Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization

Antonio Ruggia, E. Losiouk, Luca Verderame, M. Conti, A. Merlo
{"title":"Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization","authors":"Antonio Ruggia, E. Losiouk, Luca Verderame, M. Conti, A. Merlo","doi":"10.1145/3485832.3488021","DOIUrl":null,"url":null,"abstract":"A growing trend in repackaging attacks exploits the Android virtualization technique, in which malicious code can run together with the victim app in a virtual container. In such a scenario, the attacker can directly build a malicious container capable of hosting the victim app instead of tampering with it, thus neglecting any anti-repackaging protection developed so far. Also, existing anti-virtualization techniques are ineffective since the malicious container can intercept - and tamper with - such controls at runtime. So far, only two solutions have been specifically designed to address virtualization-based repackaging attacks. However, their effectiveness is limited since they both rely on static taint analysis, thus not being able to evaluate code dynamically loaded at runtime. To mitigate such a problem, in this paper we introduce MARVEL, the first methodology that allows preventing both traditional and virtualization-based repackaging attacks. MARVEL strongly relies on the virtualization technique to build a secure virtual environment where protected apps can run and be checked at runtime. To assess the viability and reliability of MARVEL, we implemented it in a tool, i.e., MARVELoid, that we tested by protecting 4000 apps with 24 different configurations of the protection parameters (i.e., 96k protection combinations). MARVELoid was able to inject the protection into 97.3% of the cases, with a processing time of 98 seconds per app on average. Moreover, we evaluated the runtime overhead on 45 apps, showing that the introduced protection has a negligible impact in terms of average CPU (<5%) and memory overhead (<0.5%).","PeriodicalId":175869,"journal":{"name":"Annual Computer Security Applications Conference","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3485832.3488021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

A growing trend in repackaging attacks exploits the Android virtualization technique, in which malicious code can run together with the victim app in a virtual container. In such a scenario, the attacker can directly build a malicious container capable of hosting the victim app instead of tampering with it, thus neglecting any anti-repackaging protection developed so far. Also, existing anti-virtualization techniques are ineffective since the malicious container can intercept - and tamper with - such controls at runtime. So far, only two solutions have been specifically designed to address virtualization-based repackaging attacks. However, their effectiveness is limited since they both rely on static taint analysis, thus not being able to evaluate code dynamically loaded at runtime. To mitigate such a problem, in this paper we introduce MARVEL, the first methodology that allows preventing both traditional and virtualization-based repackaging attacks. MARVEL strongly relies on the virtualization technique to build a secure virtual environment where protected apps can run and be checked at runtime. To assess the viability and reliability of MARVEL, we implemented it in a tool, i.e., MARVELoid, that we tested by protecting 4000 apps with 24 different configurations of the protection parameters (i.e., 96k protection combinations). MARVELoid was able to inject the protection into 97.3% of the cases, with a processing time of 98 seconds per app on average. Moreover, we evaluated the runtime overhead on 45 apps, showing that the introduced protection has a negligible impact in terms of average CPU (<5%) and memory overhead (<0.5%).
Repack Me If You Can:基于Android虚拟化的反重新包装解决方案
越来越多的重新打包攻击利用了Android虚拟化技术,恶意代码可以在虚拟容器中与受害应用程序一起运行。在这种情况下,攻击者可以直接构建一个能够承载受害应用程序的恶意容器,而不是对其进行篡改,从而忽略了迄今为止开发的任何反重新包装保护。此外,现有的反虚拟化技术是无效的,因为恶意容器可以在运行时拦截和篡改这些控制。到目前为止,只有两种解决方案专门用于解决基于虚拟化的重新打包攻击。然而,它们的有效性是有限的,因为它们都依赖于静态污染分析,因此不能评估在运行时动态加载的代码。为了缓解这样的问题,我们在本文中介绍了MARVEL,这是第一个可以防止传统和基于虚拟化的重新打包攻击的方法。MARVEL强烈依赖虚拟化技术来构建一个安全的虚拟环境,在这个环境中,受保护的应用程序可以运行并在运行时进行检查。为了评估MARVEL的可行性和可靠性,我们在一个工具中实现了它,即MARVELoid,我们通过保护4000个应用程序,使用24种不同的保护参数配置(即96k保护组合)进行了测试。MARVELoid能够为97.3%的案例注入保护,平均每个应用的处理时间为98秒。此外,我们评估了45个应用程序的运行时开销,表明引入的保护在平均CPU(<5%)和内存开销(<0.5%)方面的影响可以忽略不计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信