首页> 外文会议>European symposium on research in computer security >Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments
【24h】

Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments

机译:准确规范,用于移动环境中的恶意行为的强大检测

获取原文

摘要

The need to accurately specify and detect malicious behavior is widely known. This paper presents a novel and convenient way of accurately specifying malicious behavior in mobile environments by taking Android as a representative platform of analysis and implementation. Our specification takes a sequence-based approach in declaratively formulating a malicious action, whereby any two consecutive security-sensitive operations are connected by either a control or taint flow. It also captures the invocation context of an operation within an app's component type and lifecycle/callback method. Additionally, exclusion of operations that are invoked from UI-related callback methods can be specified to indicate an action's stealthy execution portions. We show how the specification is sufficiently expressive to describe malicious patterns that are commonly exhibited by mobile malware. To show the usefulness of the specification, and to demonstrate that it can derive stable and distinctive patterns of existing Android malware, we develop a static analyzer that can automatically check an app for numerous security-sensitive actions written using the specification. Given a target app's uncovered behavior, the analyzer associates it with a collection of known malware families. Experiments show that our obfuscation-resistant analyzer can associate malware samples with their correct family with an accuracy of 97.2 %, while retaining the ability to differentiate benign apps from the profiled malware families with an accuracy of 97.6%. These results positively show how the specification can lend to robust mobile malware detection.
机译:可以精确地确定和检测恶意行为的必要性是众所周知的。本文介绍了通过利用Android作为分析和执行的代表性平台,准确地确定在移动环境中的恶意行为,一种新颖而简便的方法。我们的规范发生在声明配制恶意操作,由此任意两个连续安全敏感操作由任一的控制或污点流连接的基于序列的方法。它还捕捉的操作的应用程序的组件类型和生命周期/回调方法中调用上下文。另外,被从UI相关的回调方法调用的操作的排除可以被指定,以指示一个动作的执行隐形部分。我们展示了如何规范充分表现来描述通常是由移动恶意软件的恶意表现出的图案。要显示规范的有效性,并证明其能够获得稳定而现有的Android恶意软件的独特的模式,我们开发了一个静态的分析仪,可以自动检查应用程序使用的规范撰写了许多安全敏感的操作。给定一个目标应用程序的裸露行为,分析其关联与已知的恶意软件家族的集合。实验结果表明,抗混淆分析仪可以恶意软件样本与他们的家庭正确使用的97.2%的准确度,同时保持分化97.6%的准确度从异形恶意软件家族良性的应用程序的能力相关联。这些结果显示出积极的规范如何借钱给强大的移动恶意软件的检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号