ผู้เขียน
Thanasis Petsas, Giannis Voyatzis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis
วันที่เผยแพร่
2014/4/13
การประชุม
Proceedings of the Seventh European Workshop on System Security (EuroSec)
หน้า
6
ผู้เผยแพร่
ACM
คำอธิบาย
Antivirus companies, mobile application marketplaces, and the security research community, employ techniques based on dynamic code analysis to detect and analyze mobile malware. In this paper, we present a broad range of anti-analysis techniques that malware can employ to evade dynamic analysis in emulated Android environments. Our detection heuristics span three different categories based on (i) static properties, (ii) dynamic sensor information, and (iii) VM-related intricacies of the Android Emulator. To assess the effectiveness of our techniques, we incorporated them in real malware samples and submitted them to publicly available Android dynamic analysis systems, with alarming results. We found all tools and services to be vulnerable to most of our evasion techniques. Even trivial techniques, such as checking the value of the IMEI, are enough to evade some of the existing dynamic analysis …
การอ้างอิงทั้งหมด
2014201520162017201820192020202120222023202493346484343273425207
บทความทางวิชาการ