TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs

03/08/2022
by   Jordan Samhi, et al.
0

Many Android apps analyzers rely, among other techniques, on dynamic analysis to monitor their runtime behavior and detect potential security threats. However, malicious developers use subtle, though efficient, techniques to bypass dynamic analyzers. Logic bombs are examples of popular techniques where the malicious code is triggered only under specific circumstances, challenging comprehensive dynamic analyses. The research community has proposed various approaches and tools to detect logic bombs. Unfortunately, rigorous assessment and fair comparison of state-of-the-art techniques are impossible due to the lack of ground truth. In this paper, we present TriggerZoo, a new dataset of 406 Android apps containing logic bombs and benign trigger-based behavior that we release only to the research community using authenticated API. These apps are real-world apps from Google Play that have been automatically infected by our tool AndroBomb. The injected pieces of code implementing the logic bombs cover a large pallet of realistic logic bomb types that we have manually characterized from a set of real logic bombs. Researchers can exploit this dataset as ground truth to assess their approaches and provide comparisons against other tools.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/23/2021

On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps

Android is present in more than 85 target for malware. Malicious code is...
research
04/09/2018

Do Android Taint Analysis Tools Keep their Promises?

In recent years, researchers have developed a number of tools to conduct...
research
12/20/2021

Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps

One prominent tactic used to keep malicious behavior from being detected...
research
09/15/2017

AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community

We present a growing collection of Android apps collected from several s...
research
05/07/2019

Dissecting Android Cryptocurrency Miners

Cryptojacking applications pose a serious threat to mobile devices. Due ...
research
05/08/2020

Feature Location Benchmark for Decomposing and Reusing Android Apps

Software reuse enables developers to reuse architecture, programs and ot...
research
06/23/2020

SIAT: A Systematic Inter-Component Communication Analysis Technology for Detecting Threats on Android

In this paper, we present the design and implementation of a Systematic ...

Please sign up or login with your details

Forgot password? Click here to reset