Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique

被引:50
|
作者
Xue, Yinxing [1 ]
Meng, Guozhu [1 ]
Liu, Yang [1 ]
Tan, Tian Huat [2 ]
Chen, Hongxu [1 ]
Sun, Jun [3 ]
Zhang, Jie [1 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Acronis Software, Singapore 038988, Singapore
[3] Singapore Univ Technol & Design, Singapore 487372, Singapore
基金
新加坡国家研究基金会;
关键词
Android feature model; defense capability; malware generation; dynamic loading; linear programming;
D O I
10.1109/TIFS.2017.2661723
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although a previous paper shows that existing antimalware tools (AMTs) may have high detection rate, the report is based on existing malware and thus it does not imply that AMTs can effectively deal with future malware. It is desirable to have an alternative way of auditing AMTs. In our previous paper, we use malware samples from android malware collection GENOME to summarize a malware meta-model for modularizing the common attack behaviors and evasion techniques in reusable features. We then combine different features with an evolutionary algorithm, in which way we evolve malware for variants. Previous results have shown that the existing AMTs only exhibit detection rate of 20%-30% for 10 000 evolved malware variants. In this paper, based on the modularized attack features, we apply the dynamic code generation and loading techniques to produce malware, so that we can audit the AMTs at runtime. We implement our approach, named MYSTIQUE-S, as a service-oriented malware generation system. MYSTIQUE-S automatically selects attack features under various user scenarios and delivers the corresponding malicious payloads at runtime. Relying on dynamic code binding (via service) and loading (via reflection) techniques, MYSTIQUE-S enables dynamic execution of payloads on user devices at runtime. Experimental results on real-world devices show that existing AMTs are incapable of detecting most of our generated malware. Last, we propose the enhancements for existing AMTs.
引用
收藏
页码:1529 / 1544
页数:16
相关论文
共 50 条
  • [21] Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information
    Jang, Jae-wook
    Kang, Hyunjae
    Woo, Jiyoung
    Mohaisen, Aziz
    Kim, Huy Kang
    COMPUTERS & SECURITY, 2016, 58 : 125 - 138
  • [22] Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
    Rastogi, Vaibhav
    Chen, Yan
    Jiang, Xuxian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (01) : 99 - 108
  • [23] On the vulnerability of anti-malware solutions to DNS attacks
    Nadler, Asaf
    Bitton, Ron
    Brodt, Oleg
    Shabtai, Asaf
    COMPUTERS & SECURITY, 2022, 116
  • [24] On the vulnerability of anti-malware solutions to DNS attacks
    Nadler, Asaf
    Bitton, Ron
    Brodt, Oleg
    Shabtai, Asaf
    Computers and Security, 2022, 116
  • [25] Anti-malware engines under adversarial attacks
    Selvaganapathy S.
    Sadasivam S.
    International Journal of Computers and Applications, 2022, 44 (08) : 791 - 804
  • [26] Using heuristic approach to build Anti-malware
    Alrammal, Muath
    Naveed, Munir
    Rihawi, Samer
    2018 FIFTH HCT INFORMATION TECHNOLOGY TRENDS (ITT): EMERGING TECHNOLOGIES FOR ARTIFICIAL INTELLIGENCE, 2018, : 191 - 196
  • [27] Benchmarking Android Malware Analysis Tools
    Higuera, Javier Bermejo
    Moreno, Javier Morales
    Higuera, Juan Ramon Bermejo
    Montalvo, Juan Antonio Sicilia
    Martillo, Gustavo Javier Barreiro
    Riera, Tomas Miguel Sureda
    ELECTRONICS, 2024, 13 (11)
  • [28] Andro-profiler: Anti-malware System Based on Behavior Profiling of Mobile Malware
    Jang, Jae-wook
    Yun, Jaesung
    Woo, Jiyoung
    Kim, Huy Kang
    WWW'14 COMPANION: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB, 2014, : 737 - 738
  • [29] An IRL-based malware adversarial generation method to evade anti-malware engines
    Li, Xintong
    Li, Qi
    COMPUTERS & SECURITY, 2021, 104
  • [30] RkFinder: A practical anti-malware system based on VMM
    Chen, Lin
    Liu, Bo
    Hu, Huaping
    Zhang, jing
    International Journal of Digital Content Technology and its Applications, 2012, 6 (19) : 530 - 537