Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps

12/20/2021
by   Jordan Samhi, et al.
0

One prominent tactic used to keep malicious behavior from being detected during dynamic test campaigns is logic bombs, where malicious operations are triggered only when specific conditions are satisfied. Defusing logic bombs remains an unsolved problem in the literature. In this work, we propose to investigate Suspicious Hidden Sensitive Operations (SHSOs) as a step towards triaging logic bombs. To that end, we develop a novel hybrid approach that combines static analysis and anomaly detection techniques to uncover SHSOs, which we predict as likely implementations of logic bombs. Concretely, Difuzer identifies SHSO entry-points using an instrumentation engine and an inter-procedural data-flow analysis. Then, it extracts trigger-specific features to characterize SHSOs and leverages One-Class SVM to implement an unsupervised learning model for detecting abnormal triggers. We evaluate our prototype and show that it yields a precision of 99.02 detect SHSOs among which 29.7 state-of-the-art in revealing more logic bombs while yielding less false positives in about one order of magnitude less time. All our artifacts are released to the community.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/23/2021

On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps

Android is present in more than 85 target for malware. Malicious code is...
research
03/08/2022

TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs

Many Android apps analyzers rely, among other techniques, on dynamic ana...
research
02/23/2018

An investigation of the classifiers to detect android malicious apps

Android devices are growing exponentially and are connected through the ...
research
02/03/2017

LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications

Mobile applications (apps) often transmit sensitive data through network...
research
05/07/2019

Dissecting Android Cryptocurrency Miners

Cryptojacking applications pose a serious threat to mobile devices. Due ...
research
06/23/2020

SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android

In this paper, we present the design and implementation of a Systematic ...

Please sign up or login with your details

Forgot password? Click here to reset