Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks

被引:122
|
作者
Rastogi, Vaibhav [1 ]
Chen, Yan [1 ,2 ]
Jiang, Xuxian [3 ]
机构
[1] Northwestern Univ, Dept Elect Engn & Comp Sci, Evanston, IL 60208 USA
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
关键词
Mobile; malware; anti-malware; Android; PAIRWISE STATISTICAL SIGNIFICANCE; SEQUENCE;
D O I
10.1109/TIFS.2013.2290431
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile malware threats (e. g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile malware threats, but also proposing effective, next-generation solutions. We developed DroidChameleon, a systematic framework with various transformation techniques, and used it for our study. Our results on 10 popular commercial anti-malware applications for Android are worrisome: none of these tools is resistant against common malware transformation techniques. In addition, a majority of them can be trivially defeated by applying slight transformation over known malware with little effort for malware authors. Finally, in light of our results, we propose possible remedies for improving the current state of malware detection on mobile devices.
引用
收藏
页码:99 / 108
页数:10
相关论文
共 50 条
  • [31] Catch me if you can
    Attinger-Toller, Adrian
    Luescher, Thomas F.
    Landmesser, Ulf
    Nietlispach, Fabian
    EUROPEAN HEART JOURNAL, 2014, 35 (14) : 903 - 903
  • [32] Catch me, if you can!
    Ghanem, Alexander
    Grube, Eberhard
    Mueller, Andreas
    Nickenig, Georg
    Sinning, Jan-Malte
    EUROPEAN HEART JOURNAL, 2012, 33 (22) : 2763 - 2763
  • [33] Catch me if you can!
    Humble, Steve
    MATHEMATICS ENTHUSIAST, 2009, 6 (1-2): : 267 - 273
  • [35] Evading android anti-malware by hiding malicious application inside images
    Badhani, Shikha
    Muttoo, Sunil K.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2018, 9 (02) : 482 - 493
  • [36] A Review of Free Cloud-Based Anti-Malware Apps for Android
    Walls, Jason
    Choo, Kim-Kwang Raymond
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1053 - 1058
  • [37] SAME: An Intelligent Anti-malware Extension for Android ART Virtual Machine
    Demertzis, Konstantinos
    Iliadis, Lazaros
    COMPUTATIONAL COLLECTIVE INTELLIGENCE (ICCCI 2015), PT II, 2015, 9330 : 235 - 245
  • [38] IntelliAV: Toward the Feasibility of Building Intelligent Anti-malware on Android Devices
    Ahmadi, Mansour
    Sotgiu, Angelo
    Giacinto, Giorgio
    MACHINE LEARNING AND KNOWLEDGE EXTRACTION, CD-MAKE 2017, 2017, 10410 : 137 - 154
  • [39] Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace
    Yu, Shui
    Guo, Song
    Stojmenovic, Ivan
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (01) : 139 - 151
  • [40] Genomics: catch me if you can
    Nathan Blow
    Nature Methods, 2009, 6 : 539 - 544