DocumentCode :
3751100
Title :
GroddDroid: a gorilla for triggering malicious behaviors
Author :
A. Abraham;R. Andriatsimandefitra;A. Brunelat;J.-F. Lalande;V. Viet Triem Tong
Author_Institution :
y ENS Cachan F-94230 Cachan, France
fYear :
2015
Firstpage :
119
Lastpage :
127
Abstract :
Android malware authors use sophisticated techniques to hide the malicious intent of their applications. They use cryptography or obfuscation techniques to avoid detection during static analysis. They can also avoid detection during a dynamic analysis. Frequently, the malicious execution is postponed as long as the malware is not convinced that it is running in a real smartphone of a real user. However, we believe that dynamic analysis methods give good results when they really monitor the malware execution. In this article1, we propose a method to enhance the execution of the malicious code of unknown malware. We especially target malware that have triggering protections, for example branching conditions that wait for an event or expect a specific value for a variable before triggering malicious execution. In these cases, solely executing the malware is far from being sufficient. We propose to force the triggering of the malicious code by combining two contributions. First, we define an algorithm that automatically identifies potentially malicious code. Second, we propose an enhanced monkey called GroddDroid, that stimulates the GUI of an application and forces the execution of some branching conditions if needed. The forcing is used by GroddDroid to push the execution flow towards the previously identified malicious parts of the malware and execute it. The source code for our experiments with GroddDroid is released as free software2. We have verified on a malware dataset that we investigated manually that the malicious code is accurately executed by GroddDroid. Additionally, on a large dataset of 100 malware we precisely identify the nature of the suspicious code and we succeed to execute it at 28%.
Keywords :
"Malware","Java","Androids","Humanoid robots","Force","Graphical user interfaces","Monitoring"
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2015 10th International Conference on
Print_ISBN :
978-1-5090-0317-4
Type :
conf
DOI :
10.1109/MALWARE.2015.7413692
Filename :
7413692
Link To Document :
بازگشت