DocumentCode :
3773796
Title :
Obfuscation Techniques against Signature-Based Detection: A Case Study
Author :
Gerardo Canfora;Andrea Di Sorbo;Francesco Mercaldo;Corrado Aaron Visaggio
Author_Institution :
Dept. of Eng., Univ. of Sannio, Benevento, Italy
fYear :
2015
fDate :
5/1/2015 12:00:00 AM
Firstpage :
21
Lastpage :
26
Abstract :
Android malware is increasingly growing interms of complexity. In order to evade signature-based detection, which represents the most adopted technique by current antimalware vendors, malware writers begin to deploy malware with the ability to change their code as they propagate.In this paper, our aim is to evaluate the robustness of Android antimalware tools when various evasion techniques are used to obfuscate malicious payloads. To support this assessment we realized a tool which applies a number of common transformations on the code of malware applications, and applied these transformations to about 5000 malware apps. Our results demonstrate that, after the code transformations, the malware is not detected by a large set of antimalware tools,even when, before applying the transformations, malware was correctly identified by most antimalware tools. Such outcomes suggest that malware detection methods must be quickly re-designed for protecting successfully smart devices.
Keywords :
"Malware","Androids","Humanoid robots","Payloads","Robustness","Engines","Mobile communication"
Publisher :
ieee
Conference_Titel :
Mobile Systems Technologies Workshop (MST), 2015
Type :
conf
DOI :
10.1109/MST.2015.8
Filename :
7469568
Link To Document :
بازگشت