• DocumentCode
    181986
  • Title

    Divide-and-Conquer: Why Android Malware Cannot Be Stopped

  • Author

    Maier, David ; Muller, Tim ; Protsenko, Mykola

  • Author_Institution
    Friedrich-Alexander-Univ. Erlangen-Nurnberg, Erlangen, Germany
  • fYear
    2014
  • fDate
    8-12 Sept. 2014
  • Firstpage
    30
  • Lastpage
    39
  • Abstract
    In this paper, we demonstrate that Android malware can bypass all automated analysis systems, including AV solutions, mobile sandboxes, and the Google Bouncer. We propose a tool called Sand-Finger for the fingerprinting of Android-based analysis systems. By analyzing the fingerprints of ten unique analysis environments from different vendors, we were able to find characteristics in which all tested environments differ from actual hardware. Depending on the availability of an analysis system, malware can either behave benignly or load malicious code at runtime. We classify this group of malware as Divide-and-Conquer attacks that are efficiently obfuscated by a combination of fingerprinting and dynamic code loading. In this group, we aggregate attacks that work against dynamic as well as static analysis. To demonstrate our approach, we create proof-of-concept malware that surpasses up-to-date malware scanners for Android. We also prove that known malware samples can enter the Google Play Store by modifying them only slightly. Due to Android´s lack of an API for malware scanning at runtime, it is impossible for AV solutions to secure Android devices against these attacks.
  • Keywords
    Android (operating system); divide and conquer methods; invasive software; mobile computing; program diagnostics; API; AV solutions; Android malware; Android-based analysis system fingerprinting; Google Bouncer; Google Play Store; Sand-Finger; automated analysis systems; divide-and-conquer attacks; dynamic code loading; malicious code; malware scanning; mobile sandboxes; proof-of-concept malware; static analysis; Androids; Google; Hardware; Humanoid robots; Malware; Mobile communication; Smart phones; AV; Android Malware; Google Bouncer; Mobile Sandboxes; Obfuscation; Static and Dynamic Analysis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Availability, Reliability and Security (ARES), 2014 Ninth International Conference on
  • Conference_Location
    Fribourg
  • Type

    conf

  • DOI
    10.1109/ARES.2014.12
  • Filename
    6980261