首页> 外文期刊>International Journal of Distributed Sensor Networks >DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis
【24h】

DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis

机译:DWroidDump:从Android应用程序中提取可执行代码以进行恶意软件分析

获取原文
           

摘要

We suggest an idea to dump executable code from memory for malicious application analysis on Android platform. Malicious applications are getting enhanced in terms of antianalysis techniques. Recently, sophisticated malicious applications have been found, which are not decompiled and debugged by existing analysis tools. It becomes serious threat to services related to embedded devices based on Android. Thus, we have implemented the idea to obtain main code from the memory by modifying a part of Dalvik Virtual Machine of Android. As a result, we have confirmed that the executable code is completely obtainable. In this paper, we introduce the existing analysis techniques for Android application, and antianalysis techniques. We then describe the proposed method with a sample malicious application which has strong antianalysis techniques.
机译:我们建议从内存中转储可执行代码以在Android平台上进行恶意应用程序分析的想法。在反分析技术方面,恶意应用程序正在得到增强。最近,发现了复杂的恶意应用程序,而现有的分析工具并未对其进行反编译和调试。它已严重威胁与基于Android的嵌入式设备相关的服务。因此,我们已经实现了通过修改Android Dalvik虚拟机的一部分从内存中获取主代码的想法。结果,我们已经确认可执行代码是完全可以获得的。在本文中,我们介绍了针对Android应用程序的现有分析技术和抗分析技术。然后,我们使用具有强大反分析技术的示例恶意应用程序来描述所提出的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号