Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique

被引:50
|
作者
Xue, Yinxing [1 ]
Meng, Guozhu [1 ]
Liu, Yang [1 ]
Tan, Tian Huat [2 ]
Chen, Hongxu [1 ]
Sun, Jun [3 ]
Zhang, Jie [1 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Acronis Software, Singapore 038988, Singapore
[3] Singapore Univ Technol & Design, Singapore 487372, Singapore
基金
新加坡国家研究基金会;
关键词
Android feature model; defense capability; malware generation; dynamic loading; linear programming;
D O I
10.1109/TIFS.2017.2661723
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although a previous paper shows that existing antimalware tools (AMTs) may have high detection rate, the report is based on existing malware and thus it does not imply that AMTs can effectively deal with future malware. It is desirable to have an alternative way of auditing AMTs. In our previous paper, we use malware samples from android malware collection GENOME to summarize a malware meta-model for modularizing the common attack behaviors and evasion techniques in reusable features. We then combine different features with an evolutionary algorithm, in which way we evolve malware for variants. Previous results have shown that the existing AMTs only exhibit detection rate of 20%-30% for 10 000 evolved malware variants. In this paper, based on the modularized attack features, we apply the dynamic code generation and loading techniques to produce malware, so that we can audit the AMTs at runtime. We implement our approach, named MYSTIQUE-S, as a service-oriented malware generation system. MYSTIQUE-S automatically selects attack features under various user scenarios and delivers the corresponding malicious payloads at runtime. Relying on dynamic code binding (via service) and loading (via reflection) techniques, MYSTIQUE-S enables dynamic execution of payloads on user devices at runtime. Experimental results on real-world devices show that existing AMTs are incapable of detecting most of our generated malware. Last, we propose the enhancements for existing AMTs.
引用
收藏
页码:1529 / 1544
页数:16
相关论文
共 50 条
  • [1] Mystique: Evolving Android Malware for Auditing Anti-Malware Tools
    Meng, Guozhu
    Xue, Yinxing
    Mahinthan, Chandramohan
    Narayanan, Annamalai
    Liu, Yang
    Zhang, Jie
    Chen, Tieming
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 365 - 376
  • [2] A Malware Evasion Technique for Auditing Android Anti-Malware Solutions
    Mirza, Samrah
    Abbas, Haider
    Bin Shahid, Waleed
    Shafqat, Narmeen
    Fugini, Mariagrazia
    Iqbal, Zafar
    Muhammad, Zia
    2021 IEEE 30TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE 2021), 2021, : 125 - 130
  • [3] A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
    Alrammal, Muath
    Naveed, Munir
    Sallam, Suzan
    Tsaramirsis, Georgios
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (07): : 1651 - 1661
  • [4] A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware
    Muhammad, Zia
    Amjad, Muhammad Faisal
    Abbas, Haider
    Iqbal, Zafar
    Azhar, Anique
    Yasin, Ahsan
    Iesar, Hasan
    2021 IEEE 19TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2021), 2021, : 117 - 124
  • [5] Effectiveness of Android Obfuscation on Evading Anti-malware
    Chua, Melissa
    Balachandran, Vivek
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 143 - 145
  • [6] Auditing static machine learning anti-Malware tools against metamorphic attacks
    Gibert, Daniel
    Mateu, Carles
    Planes, Jordi
    Marques-Silva, Joao
    COMPUTERS & SECURITY, 2021, 102
  • [7] ATE: Anti-malware Technique Evaluator
    Corregedor, Manuel
    Von Solms, Sebastiaan
    2012 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2012,
  • [8] Coevolution of Mobile Malware and Anti-Malware
    Sen, Sevil
    Aydogan, Emre
    Aysan, Ahmet I.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (10) : 2563 - 2574
  • [9] Anti-malware technologies
    Itoh, Mitsutaka
    Hariu, Takeo
    Tanimoto, Naoto
    Iwamura, Makoto
    Yagi, Takeshi
    Kawakoya, Yuhei
    Aoki, Kazufumi
    Akiyama, Mitsuaki
    Nakayama, Shinta
    NTT Technical Review, 2010, 8 (07):
  • [10] When Your Anti-Malware Software Becomes Malware
    Stone, W. Ross
    IEEE ANTENNAS AND PROPAGATION MAGAZINE, 2018, 60 (04) : 144 - 147