StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications
Articolo
Data di Pubblicazione:
2020
Abstract:
Dynamic code update techniques (Android Studio – support for dynamic delivery), such as dynamic classloading and reflection, enable Android apps to extend their functionality at runtime. At the same time,these techniques are misused by malware developers to transform a seemingly benign app into a mal-ware, once installed on a real device. Among the corpus of evasive techniques used in modern real-worldmalware, evasive usage of dynamic code updates plays a key role.First, we demonstrate the ineffectiveness of existing tools to analyze apps in the presence of dynamiccode updates using our test apps, i.e.,Reflection-Benchand InboxArchiver. Second, we present StaDART,combining static and dynamic analysis of Android apps to reveal the concealed behavior of malware.StaDART performs dynamic code interposition using a vtable tampering technique for API hooking toavoid modifications to the Android framework. Furthermore, we integrate it with a triggering solution,DroidBot, to make it more scalable and fully automated. We present our evaluation results with a datasetof 2000 real world apps; containing 1000 legitimate apps and 1000 malware samples. The evaluationresults with this dataset and Reflection-Bench show that StaDART reveals suspicious behavior that is oth-erwise hidden to static analysis tools.
Tipologia CRIS:
03A-Articolo su Rivista
Keywords:
Android, Dynamic code updates, Reflection, Dynamic class loading, Security analysis
Elenco autori:
Ahmad, Maqsood; Costamagna, Valerio; Crispo, Bruno; Bergadano, Francesco; Zhauniarovich, Yury
Link alla scheda completa:
Pubblicato in: