Stealth attacks: An extended insight into the obfuscation effects on Android malware

Computers & Security - Tập 51 - Trang 16-31 - 2015
Davide Maiorca1, Davide Ariu1, Igino Corona1, Mauro Aresu1, Giorgio Giacinto1
1Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d’Armi, 09123, Cagliari, Italy

Tóm tắt

Từ khóa


Tài liệu tham khảo

Allatori, http://www.allatori.com/features/android-obfuscation.html.

Amazon App Store, http://www.amazon.com/appstore.

Androguard, http://code.google.com/p/androguard/...

Android Open Source Project, 2007

Anubis, https://anubis.iseclab.org/.

ApkFuscator

A. Apvrille, R. Nigam, Obfuscation in Android malware, and how to fight back, https://www.virusbtn.com/virusbulletin/archive/2014/07/vb201407-Android-obfuscation.

Arp, 2014, Drebin: efficient and explainable detection of android malware in your pocket

Baksmali, https://code.google.com/p/smali/.

Mario Ballano, Android Malware, www.itu.int/ITU-D/eur/rf/cybersecurity/presentations/symantec-itu_mobile.pdf.

BGR, An incredibly sneaky piece of malware has finally been pulled from Google Play, http://bgr.com/2014/06/18/google-play-store-android-malware-app/.

Bluebox, Android Fake ID Vulnerability Lets Malware Impersonate Trusted Applications, Puts All Android Users Since January 2010 At Risk, https://bluebox.com/technical/android-fake-id-vulnerability/.

Cisco, Snort, http://www.snort.org.

Collberg, 1997

AV Comparatives, http://www.av-comparatives.org/.

AV Comparatives, Cybercriminals infiltrate Android markets, http://www.av-comparatives.org/wp-content/uploads/2013/08/apkstores_investigation_2013.pdf.

DashO, https://www.preemptive.com/products/dasho.

Dedexer, http://dedexer.sourceforge.net/.

DexProtector, http://dexprotector.com/.

F-Secure, 2014

Huang, 2013, A framework for evaluating mobile app repackaging detection algorithms, 169

Ionescu, 2012

Jiang, 2011

Labs, 2011

Lookout Labs, Dendroid malware can take over your camera, record audio, and sneak into Google Play, https://blog.lookout.com/blog/2014/03/06/dendroid/.

E. Lafortune, ProGuard, http://developer.android.com/tools/help/proguard.html.

Maggi, 2013, AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors

Nihilus, 2013

Nolan, 2012

Oracle, Java Reflection API, http://docs.oracle.com/javase/tutorial/reflect/.

Palo Alto Networks, Bad Certificate Management in Google Play Store, http://researchcenter.paloaltonetworks.com/2014/08/bad-certificate-management-google-play-store/.

M. Parkour, Contagio Mobile – Mobile Malware Mini Dump, http://contagiominidump.blogspot.com/.

Petsas, 2014, Rage against the virtual machine: hindering dynamic analysis of android malware, 5:1

Protsenko, 2013, PANDORA applies non-deterministic obfuscation randomly to android, 59

Rastogi, 2013, DroidChameleon: evaluating android anti-malware against transformation attacks, 329

Rastogi, 2014, Catch me if you can: evaluating android anti-malware against transformation attacks, IEEE Trans Inf Forens Secur, 9, 99, 10.1109/TIFS.2013.2290431

Saikoa, DexGuard, http://www.saikoa.com/dexguard.

Samsung App Store, http://apps.samsung.com.

SecurityWatch, Banking Malware Pulled From Google Play, http://securitywatch.pcmag.com/mobile-security/325324-banking-malware-pulled-from-google-play.

Trendmicro, A look at Google Bouncer, http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-google-bouncer/.

Unuchek, 2013

VirusTotal, https://www.virustotal.com.

Yu, 2013, Ginmaster: a case study in Android Malware

Zheng, 2012, ADAM: an automatic and extensible platform to stress test android anti-virus systems, 82

Zhou, 2012

Zhou, 2012, Dissecting android malware: characterization and evolution, 95