Nowadays, Android malware uses sensitive APIs to manipulate an Android device's resources frequently. Conventional malware analysis uses hooking techniques to detect this harmful behavior. However, this approach is facing many problems, such as low coverage rate and computational overhead. To solve this problem, we proposed HALWatcher, an alternative technique to monitor resource manipulation on Android Open Source Project (AOSP). By modifying Hardware Abstract Layer (HAL) resource accessing interfaces and their implementation, we can embed more monitoring functions at critical methods that are in charge of transferring data between the Hardware Driver and the Framework Layer. Hence, HALWatcher provides a lightweight and high coverage rate system that can perform resource manipulation monitoring for Android OS. In this paper, we prove that the hooking technique is limited in detecting resource manipulation attacks. Besides that, HALWatcher shows an outperform detection rate with a low computational effort.
CITATION STYLE
Doan, T. P., Park, J., & Jung, S. (2020). HAL-based resource manipulation monitoring on AOSP. Mobile Information Systems, 2020. https://doi.org/10.1155/2020/8863385
Mendeley helps you to discover research relevant for your work.