Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices

被引:1
|
作者
Irolla, Paul [1 ]
Filiol, Eric [1 ]
机构
[1] Ecole Ingn Monde Numer ESIEA, Lab Cryptol & Virol Operat, CVO Lab, 38 Rue Docteurs Calmette & Guerin, F-53000 Laval, France
关键词
Dynamic Analysis; Android; Malware Detection; Automatic Testing;
D O I
10.5220/0006094006100621
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android is the most widely used smartphone OS with 82.8% market share in 2015 (IDC, 2015). It is therefore the most widely targeted system by malware authors. Researchers rely on dynamic analysis to extract malware behaviors and often use emulators to do so. However, using emulators lead to new issues. Malware may detect emulation and as a result it does not execute the payload to prevent the analysis. Dealing with virtual device evasion is a never-ending war and comes with a non-negligible computation cost (Lindorfer et al., 2014). To overcome this state of affairs, we propose a system that does not use virtual devices for analysing malware behavior. Glassbox is a functional prototype for the dynamic analysis of malware applications. It executes applications on real devices in a monitored and controlled environment. It is a fully automated system that installs, tests and extracts features from the application for further analysis. We present the architecture of the platform and we compare it with existing Android dynamic analysis platforms. Lastly, we evaluate the capacity of Glassbox to trigger application behaviors by measuring the average coverage of basic blocks on the AndroCoverage dataset (AndroCoverage, 2016). We show that it executes on average 13.52% more basic blocks than the Monkey program.
引用
收藏
页码:610 / 621
页数:12
相关论文
共 50 条
  • [21] Research Trends in Malware Detection on Android Devices
    Aneja, Leesha
    Babbar, Sakshi
    DATA SCIENCE AND ANALYTICS, 2018, 799 : 629 - 642
  • [22] Permission based malware detection in android devices
    Ilham, Soussi
    Abderrahim, Ghadi
    Abdelhakim, Boudhir Anouar
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON SMART CITY APPLICATIONS (SCA'18), 2018,
  • [23] Malware Detection with Confidence Guarantees on Android Devices
    Georgiou, Nestoras
    Konstantinidis, Andreas
    Papadopoulos, Harris
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, AIAI 2016, 2016, 475 : 407 - 418
  • [24] Detecting Malware with Similarity to Android applications
    Park, Wonjoo
    Kim, Sun-joong
    Ryu, Won
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1249 - 1251
  • [25] The Evolution of Android Malware and Android Analysis Techniques
    Tam, Kimberly
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Cavallaro, Lorenzo
    ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [26] DroidScreening: a practical framework for real-world Android malware analysis
    Yu, Junfeng
    Huang, Qingfeng
    Yian, CheeHoo
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1435 - 1449
  • [27] Challenges in Android Malware Analysis
    Tong, Valerie Viet Triem
    Lalande, Jean Francois
    Leslous, Mourad
    ERCIM NEWS, 2016, (106): : 42 - +
  • [28] The analysis of android malware behaviors
    Department of Computer and Information Engineering, Huainan Normal University, Huainan, China
    Int. J. Secur. Appl., 3 (335-346):
  • [29] Framework for malware analysis in Android
    Urcuqui Lopez, Christian Camilo
    Navarro Cadavid, Andres
    SISTEMAS & TELEMATICA, 2016, 14 (37): : 45 - 56
  • [30] The Analysis of Android Malware Behaviors
    Fan Yuhui
    Xu Ning
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 335 - 345