How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack

2Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Android permission mechanism cannot resist permission abuse, the key of malware detection is to expose its malicious behavior. Although plentiful transformation attacks are used to bypass malware detection, the latest information-flow analysis based defenses claim that they can identify malicious flows with high accuracy. Nevertheless, in this paper, we expose a new attack surface known as Behavior-Mask attack in Android Runtime (ART), which can bypass most known information-flow analysis based defenses in practice. Our attack techniques can be utilized to hide Android applications’ actual behavior by only executing some irrelevant Java code in the normal way. We corrupt few runtime data through a small piece of JNI code to hijack the control flow and data flow of Java code dynamically in ART environment. Further, we implement an automatic development framework to demonstrate the viability of Behavior-Mask attack. We analyze the existing defenses on Android and traditional desktop operating systems, and put forward some new ideas for the design and implementation of future defenses against the proposed attack.

Cite

CITATION STYLE

APA

Yang, X., Liu, L., Zhang, L., Jiang, W., & Pan, S. (2017). How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10599 LNCS, pp. 269–287). Springer Verlag. https://doi.org/10.1007/978-3-319-69659-1_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free