Flowminer: Automatic summarization of library data-flow for malware analysis

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Malware often conceal their malicious behavior by making unscrupulous use of library APIs. Hence any accurate malware analysis must track data-flows not only through the application but also through the library. Libraries like Android (2 mLOC) are too large to be analyzed repeatedly with each application, hence we need to compute data-flow summaries of libraries that are expressive enough to reveal possible mali- cious flows, and compact to be included in malware analysis along with each application. We present FlowMiner, a novel approach to automatically extract the data-flow summary of a Java library, given its source or bytecode. FlowMiner’s summaries are fine-grained, i.e., preserve key artifacts from the original library to enable accurate context, object, field, flow and type-sensitive malware analysis of applications in conjunction with the library. Unlike prior summarization techniques, FlowMiner resolves method calls to anonymous classes to a single target, making it more precise. FlowMiner’s summaries are compact, e.g., contain only about a third (fourth) of the nodes (edges, resp.) in the data-flow semantics of recent versions of Android. FlowMiner’s summaries are stored in XML, allowing any analysis tool to use them for analysis.

Cite

CITATION STYLE

APA

Deering, T., Santhanam, G. R., & Kothari, S. (2015). Flowminer: Automatic summarization of library data-flow for malware analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9478, pp. 171–191). Springer Verlag. https://doi.org/10.1007/978-3-319-26961-0_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free