• DocumentCode
    680919
  • Title

    Automated Execution Control and Dynamic Behavior Monitoring for Android (TM) Applications

  • Author

    Ter Louw, Mike ; Krull, Marc ; Thomas, Tessamma ; Cathey, Rebecca ; Frazier, Gregory ; Weber, Matthias

  • Author_Institution
    Bell Labs., LGS Innovations, Florham Park, NJ, USA
  • fYear
    2013
  • fDate
    18-20 Nov. 2013
  • Firstpage
    968
  • Lastpage
    973
  • Abstract
    We explore techniques for eliciting a behavioral description from an Android smartphone app in a controlled manner. A description of app behavior is useful for performing subsequent analysis such as model checking, for example to verify the app satisfies a set of desirable security properties. Our solution is to dynamically execute the app in a customized version of the Android SDK emulator, which provides many of an app´s inputs as responses to invoked API calls. A more focused set of input values computed offline are then injected to the app via hooks introduced into the Android API implementation. To dynamically monitor app behavior, we instrument the app bytecode to record control and data flows during execution. We also instrument the Android API to record all of the app´s inputs and outputs. We have used this technique on the DARPA Automated Program Analysis for Cybersecurity (APAC) program to reveal hidden, triggerable attacks in independently developed challenge apps. Our framework for extracting app behavior is part of Droid Reasoning, Analysis, and Protection Engine (DRAPE), an integrated, semi-automated app behavior analysis system capable of discovering hidden malware in Android apps.
  • Keywords
    Android (operating system); invasive software; smart phones; telecommunication security; APAC; API calls; Android API implementation; Android SDK emulator; Android smartphone; DARPA automated program analysis for cybersecurity; DRAPE; app bytecode; automated execution control; droid reasoning analysis protection engine; dynamic behavior monitoring; hidden malware; model checking; semiautomated app behavior analysis system; Androids; Humanoid robots; Instruments; Malware; Monitoring; Runtime; Android; Automated Execution Control; Bytecode Instrumentation; Dynamic Behavior Monitoring;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, MILCOM 2013 - 2013 IEEE
  • Conference_Location
    San Diego, CA
  • Type

    conf

  • DOI
    10.1109/MILCOM.2013.168
  • Filename
    6735749