Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/99421
Title: | AndroNeo : hardening Android malware sandboxes by predicting evasion heuristics |
Authors: | Leguesse, Yonas Vella, Mark Joseph Ellul, Joshua |
Keywords: | Operating systems (Computers) Android (Electronic resource) Malware (Computer software) Mobile computing Smartphones -- Security measures |
Issue Date: | 2017 |
Publisher: | Springer |
Citation: | Leguesse, Y., Vella, M., & Ellul, J. (2017, September). AndroNeo : Hardening Android malware sandboxes by predicting evasion heuristics. In IFIP International Conference on Information Security Theory and Practice (pp. 140-152). Springer, Cham. |
Abstract: | Sophisticated Android malware families often implement techniques aimed at avoiding detection. Split personality malware for example, behaves benignly when it detects that it is running on an analysis environment such as a malware sandbox, and maliciously when running on a real user’s device. These kind of techniques are problematic for malware analysts, often rendering them unable to detect or understand the malicious behaviour. This is where sandbox hardening comes into play. In our work, we exploit sandbox detecting heuristic prediction to predict and automatically generate bytecode patches, in order to disable the malware’s ability to detect a malware sandbox. Through the development of AndroNeo, we demonstrate the feasibility of our approach by showing that the heuristic prediction basis is a solid starting point to build upon, and demonstrating that when heuristic prediction is followed by bytecode patch generation, split personality can be defeated. |
URI: | https://www.um.edu.mt/library/oar/handle/123456789/99421 |
Appears in Collections: | Scholarly Works - FacICTCS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
AndroNeo__Hardening_Android_malware_sandboxes_by_predicting_evasion_heuristics(2017).pdf | 624.75 kB | Adobe PDF | View/Open |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.