When the Guard failed the Droid: A case study of Android malware

03/31/2020
by   Harel Berger, et al.
0

Android malware is a persistent threat to billions of users around the world. As a countermeasure, Android malware detection systems are occasionally implemented. However, these systems are often vulnerable to evasion attacks, in which an adversary manipulates malicious instances so that they are misidentified as benign. In this paper, we launch various innovative evasion attacks against several Android malware detection systems. The vulnerability inherent to all of these systems is that they are part of Androguard <cit.>, a popular open source library used in Android malware detection systems. Some of the detection systems decrease to a 0% detection rate after the attack. Therefore, the use of open source libraries in malware detection systems calls for caution. In addition, we present a novel evaluation scheme for evasion attack generation that exploits the weak spots of known Android malware detection systems. In so doing, we evaluate the functionality and maliciousness of the manipulated instances created by our evasion attacks. We found variations in both the maliciousness and functionality tests of our manipulated apps. We show that non-functional apps, while considered malicious, do not threaten users and are thus useless from an attacker's point of view. We conclude that evasion attacks must be assessed for both functionality and maliciousness to evaluate their impact, a step which is far from commonplace today.

READ FULL TEXT
research
05/22/2019

DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling

With the number of new mobile malware instances increasing by over 50% a...
research
02/28/2022

MaMaDroid2.0 – The Holes of Control Flow Graphs

Android malware is a continuously expanding threat to billions of mobile...
research
05/29/2022

Problem-Space Evasion Attacks in the Android OS: a Survey

Android is the most popular OS worldwide. Therefore, it is a target for ...
research
07/31/2018

Open Source Android Vulnerability Detection Tools: A Survey

Since last decade, smartphones have become an integral part of everyone'...
research
11/25/2018

Poisoning Behavioral Malware Clustering

Clustering algorithms have become a popular tool in computer security to...
research
06/27/2018

An Extensive Evaluation of the Internet's Open Proxies

Open proxies forward traffic on behalf of any Internet user. Listed on o...
research
03/15/2023

Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information

The function call graph (FCG) based Android malware detection methods ha...

Please sign up or login with your details

Forgot password? Click here to reset