Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications
نویسندگان
چکیده
The design of the Android system allows applications to load additional code from external sources at runtime. On the one hand, malware can use this capability to add malicious functionality after it has been inspected by an application store or anti-virus engine at installation time. On the other hand, developers of benign applications can inadvertently introduce vulnerabilities. In this paper, we systematically analyze the security implications of the ability to load additional code in Android. We developed a static analysis tool to automatically detect attempts to load external code using static analysis techniques, and we performed a large-scale study of 1,632 popular applications from the Google Play store, showing that loading external code in an insecure way is a problem in as much as 9.25% of those applications and even 16% of the top 50 free applications. We also show how malware can use code-loading techniques to avoid detection by exploiting a conceptual weakness in current Android malware protection. Finally, we propose modifications to the Android framework that enforce integrity checks on code to mitigate the threats imposed by the ability to load external code.
منابع مشابه
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications
The design of the Android system allows applications to load additional code from external sources at runtime. On the one hand, malware can use this capability to add malicious functionality after it has been inspected by an application store or anti-virus engine at installation time. On the other hand, developers of benign applications can inadvertently introduce vulnerabilities. In this paper...
متن کاملAn Assess Android Antimalware that Detects Malicious Dynamic Code in Apps
-Android is currently the most popular operating system and a considerable number of Smartphone’s, tablet computers ship with Android. However, users feel their private information at threat, facing a rapidly increasing number of malware for Android which significantly exceeds that of other platforms. Antimalware’s software promises to effectively protect against malware on Smartphone’s and man...
متن کاملTargeted Dynamic Analysis for Android Malware
Targeted Dynamic Analysis for Android Malware Michelle Wong Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto 2015 The identification and analysis of Android malware involves either static or dynamic program analysis of the malware binary. While static analysis has good code coverage, it is not as precise due to the lack of run-time infor...
متن کاملA game of Droid and Mouse: The threat of split-personality malware on Android
In the work at hand, we first demonstrate that Android malware can bypass current automated analysis systems, including AV solutions, mobile sandboxes, and the Google Bouncer. A tool called Sand-Finger allowed us to fingerprint Android-based analysis systems. By analyzing the fingerprints of ten unique analysis environments from different vendors, we were able to find characteristics in which a...
متن کاملScalable Traffic Dependence Analysis for Detecting Android Malware Activities
The openness of Android application development mechanism poses security challenges to smartphone users. Malicious apps (malware) may be created by repackaging popular apps. At runtime, they directly fetch and run code on-thefly without the user’s knowledge [6]. Thereafter, malicious apps may spy on the victim users, stealthily collect and exfiltrate user’s information. Therefore, they threaten...
متن کامل