Authors
Niccolò Marastoni, Andrea Continella, Davide Quarta, Stefano Zanero, Mila Dalla Preda
Publication date
2017/12
Conference
Software Security, Protection, and Reverse Engineering Workshop
Description
As shown in previous work, malware authors often reuse portions of code in the development of their samples. Especially in the mobile scenario, there exists a phenomena, called piggybacking, that describes the act of embedding malicious code inside benign apps. In this paper, we leverage such observations to analyze mobile malware by looking at its similarities. In practice, we propose a novel approach that identifies and extracts code similarities in mobile apps. Our approach is based on static analysis and works by computing the Control Flow Graph of each method and encoding it in a feature vector used to measure similarities. We implemented our approach in a tool, GroupDroid, able to group mobile apps together according to their code similarities. Armed with Group-Droid, we then analyzed modern mobile malware samples. Our experiments show that GroupDroid is able to correctly and accurately …
Total citations
20182019202020212022202320242833472
Scholar articles
N Marastoni, A Continella, D Quarta, S Zanero… - Proceedings of the 7th Software Security, Protection …, 2017