Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices

被引:1
|
作者
Irolla, Paul [1 ]
Filiol, Eric [1 ]
机构
[1] Ecole Ingn Monde Numer ESIEA, Lab Cryptol & Virol Operat, CVO Lab, 38 Rue Docteurs Calmette & Guerin, F-53000 Laval, France
关键词
Dynamic Analysis; Android; Malware Detection; Automatic Testing;
D O I
10.5220/0006094006100621
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android is the most widely used smartphone OS with 82.8% market share in 2015 (IDC, 2015). It is therefore the most widely targeted system by malware authors. Researchers rely on dynamic analysis to extract malware behaviors and often use emulators to do so. However, using emulators lead to new issues. Malware may detect emulation and as a result it does not execute the payload to prevent the analysis. Dealing with virtual device evasion is a never-ending war and comes with a non-negligible computation cost (Lindorfer et al., 2014). To overcome this state of affairs, we propose a system that does not use virtual devices for analysing malware behavior. Glassbox is a functional prototype for the dynamic analysis of malware applications. It executes applications on real devices in a monitored and controlled environment. It is a fully automated system that installs, tests and extracts features from the application for further analysis. We present the architecture of the platform and we compare it with existing Android dynamic analysis platforms. Lastly, we evaluate the capacity of Glassbox to trigger application behaviors by measuring the average coverage of basic blocks on the AndroCoverage dataset (AndroCoverage, 2016). We show that it executes on average 13.52% more basic blocks than the Monkey program.
引用
收藏
页码:610 / 621
页数:12
相关论文
共 50 条
  • [1] Android Platform Malware Analysis
    Alfalqi, Khalid
    Alghamdi, Rubayyi
    Waqdan, Mofareh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (01) : 140 - 146
  • [2] A review of cloned mobile malware applications for android devices
    Baykara, Muhammet
    Colak, Eren
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 394 - 398
  • [3] Static and Dynamic Analysis of Android Malware
    Kapratwar, Ankita
    Di Troia, Fabio
    Stamp, Mark
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 653 - 662
  • [4] Malware Detection in Android based on Dynamic Analysis
    Bhatia, Taniya
    Kaushal, Rishabh
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,
  • [5] SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform
    Jeong, Eun Su
    Kim, In Seok
    Lee, Dong Hoon
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (17) : 18153 - 18173
  • [6] SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform
    Eun Su Jeong
    In Seok Kim
    Dong Hoon Lee
    Multimedia Tools and Applications, 2017, 76 : 18153 - 18173
  • [7] Monitoring Real Android Malware
    Kuester, Jan-Christoph
    Bauer, Andreas
    RUNTIME VERIFICATION, RV 2015, 2015, 9333 : 136 - 152
  • [8] Static and Dynamic Integrated Analysis Scheme for Android Malware
    Chun-Hao Yung
    Wen-Shenq Juang
    Journal of Electronic Science and Technology, 2017, 15 (03) : 246 - 250
  • [9] A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware
    Faiella, Mario
    La Marra, Antonio
    Martinelli, Fabio
    Mercaldo, Francesco
    Saracino, Andrea
    Sheikhalishahi, Mina
    2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 321 - 328
  • [10] Detecting Intelligent Malware on Dynamic Android Analysis Environments
    Singh, Shirish
    Mishra, Bharavi
    Singh, Saket
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 414 - 419