Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps

31Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

One prominent tactic used to keep malicious behavior from being detected during dynamic test campaigns is logic bombs, where malicious operations are triggered only when specific conditions are satisfied. Defusing logic bombs remains an unsolved problem in the literature. In this work, we propose to investigate Suspicious Hidden Sensitive Operations (SHSOs) as a step towards triaging logic bombs. To that end, we develop a novel hybrid approach that combines static analysis and anomaly detection techniques to un-cover SHSOs, which we predict as likely implementations of logic bombs. Concretely, Difuzer identifies SHSO entry-points using an instrumentation engine and an inter-procedural data-flow analysis. Then, it extracts trigger-specific features to characterize SHSOs and leverages One-Class SVM to implement an unsupervised learning model for detecting abnormal triggers. We evaluate our prototype and show that it yields a precision of 99.02% to detect SHSOs among which 29.7% are logic bombs. Difuzer outperforms the state-of-the-art in revealing more logic bombs while yielding less false positives in about one order of magnitude less time. All our artifacts are released to the community.

Cite

CITATION STYLE

APA

Samhi, J., Li, L., Bissyande, T. F., & Klein, J. (2022). Difuzer: Uncovering Suspicious Hidden Sensitive Operations in Android Apps. In Proceedings - International Conference on Software Engineering (Vol. 2022-May, pp. 723–735). IEEE Computer Society. https://doi.org/10.1145/3510003.3510135

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free