首页> 外文期刊>Computers & Security >Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models
【24h】

Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models

机译:Dexteroid:使用逆向工程生命周期模型检测Android应用程序中的恶意行为

获取原文
获取原文并翻译 | 示例
           

摘要

The amount of Android malware has increased greatly during the last few years. Static analysis is widely used in detecting such malware by analyzing the code without execution. The effectiveness of current tools relies on the app model as well as the malware detection algorithm which analyzes the app model. If the model and/or the algorithm is inadequate, then sophisticated attacks that are triggered by specific sequences of events will not be detected. This paper presents a static analysis framework called Dexteroid, which uses reverse-engineered life cycle models to accurately capture the behaviors of Android components. Dexteroid systematically derives event sequences from the models, and uses them to detect attacks launched by specific ordering of events. A prototype implementation of Dexteroid detects two types of attacks: (1) leakage of private information, and (2) sending SMS to premium-rate numbers. A series of experiments are conducted on 1526 Google Play apps, 1259 Genome Malware apps, and a suite of benchmark apps called DroidBench and the results are compared with a state-of-the-art static analysis tool called FlowDroid. The evaluation results show that the proposed framework is effective and efficient in terms of precision, recall, and execution time.
机译:在过去几年中,Android恶意软件的数量已大大增加。静态分析广泛用于通过分析代码而不执行代码来检测此类恶意软件。当前工具的有效性取决于应用程序模型以及分析应用程序模型的恶意软件检测算法。如果模型和/或算法不足,那么将不会检测到由特定事件序列触发的复杂攻击。本文介绍了一个称为Dexteroid的静态分析框架,该框架使用反向工程生命周期模型来准确捕获Android组件的行为。 Dexteroid从模型中系统地导出事件序列,并使用它们来检测由事件的特定顺序引发的攻击。 Dexteroid的原型实现检测两种类型的攻击:(1)泄漏私人信息,以及(2)将SMS发送给高价位号码。在1526个Google Play应用程序,1259个Genome恶意软件应用程序以及称为DroidBench的一组基准测试应用程序上进行了一系列实验,并将结果与​​称为FlowDroid的最新静态分析工具进行了比较。评估结果表明,所提出的框架在准确性,召回率和执行时间方面是有效的。

著录项

  • 来源
    《Computers & Security》 |2016年第6期|92-117|共26页
  • 作者单位

    Department of Computer Science and Engineering, University of Texas at Arlington, Arlington, USA;

    Department of Computer Science and Engineering, University of Texas at Arlington, Arlington, USA;

    Department of Computer Science and Engineering, University of Texas at Arlington, Arlington, USA;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Static analysis; Mobile app security; Android; Malware; Privacy; Life cycle models;

    机译:静态分析;移动应用安全性;Android;恶意软件;隐私;生命周期模型;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号