Evaluation of Survivability of the Automatically Obfuscated Android Malware

3Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware variants even by attackers with entry-level programming skills. Such obfuscation techniques can evade the signature-based mechanism implemented in current antimalware technology. This paper presents the results of a study that examined how automated obfuscation techniques affect malicious and benign applications by two widely used malware detection approaches, namely static and dynamic analyses. The research explored 5000 samples of malware and benign programs and evaluated the impact of automated obfuscation on Android applications. The experimental results indicated that (1) up to 73% of the reviewed applications “survived” the automated obfuscation; (2) automated obfuscation reduced the detection ratio to 65–85% depending on the obfuscation method used. These findings call for a more active use of advanced malware detection methods in commonly used antivirus platforms.

Cite

CITATION STYLE

APA

Patel, H., Patel, D., Ahluwalia, J., Kapoor, V., Narasimhan, K., Singh, H., … Butakov, S. (2022). Evaluation of Survivability of the Automatically Obfuscated Android Malware. Applied Sciences (Switzerland), 12(10). https://doi.org/10.3390/app12104969

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free