Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/99421
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLeguesse, Yonas-
dc.contributor.authorVella, Mark Joseph-
dc.contributor.authorEllul, Joshua-
dc.date.accessioned2022-07-15T11:00:29Z-
dc.date.available2022-07-15T11:00:29Z-
dc.date.issued2017-
dc.identifier.citationLeguesse, Y., Vella, M., & Ellul, J. (2017, September). AndroNeo : Hardening Android malware sandboxes by predicting evasion heuristics. In IFIP International Conference on Information Security Theory and Practice (pp. 140-152). Springer, Cham.en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/99421-
dc.description.abstractSophisticated Android malware families often implement techniques aimed at avoiding detection. Split personality malware for example, behaves benignly when it detects that it is running on an analysis environment such as a malware sandbox, and maliciously when running on a real user’s device. These kind of techniques are problematic for malware analysts, often rendering them unable to detect or understand the malicious behaviour. This is where sandbox hardening comes into play. In our work, we exploit sandbox detecting heuristic prediction to predict and automatically generate bytecode patches, in order to disable the malware’s ability to detect a malware sandbox. Through the development of AndroNeo, we demonstrate the feasibility of our approach by showing that the heuristic prediction basis is a solid starting point to build upon, and demonstrating that when heuristic prediction is followed by bytecode patch generation, split personality can be defeated.en_GB
dc.language.isoenen_GB
dc.publisherSpringeren_GB
dc.rightsinfo:eu-repo/semantics/openAccessen_GB
dc.subjectOperating systems (Computers)en_GB
dc.subjectAndroid (Electronic resource)en_GB
dc.subjectMalware (Computer software)en_GB
dc.subjectMobile computingen_GB
dc.subjectSmartphones -- Security measuresen_GB
dc.titleAndroNeo : hardening Android malware sandboxes by predicting evasion heuristicsen_GB
dc.typeconferenceObjecten_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.bibliographicCitation.conferencenameWISTP 2017en_GB
dc.bibliographicCitation.conferenceplaceHeraklion, Greece, 28-29/09/2017en_GB
dc.description.reviewedpeer-revieweden_GB
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
AndroNeo__Hardening_Android_malware_sandboxes_by_predicting_evasion_heuristics(2017).pdf624.75 kBAdobe PDFView/Open


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.