Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van der Veen, Christian Platzer
- Vienna University of Technology
University of California, Santa Barbara VU University Amsterdam
Andrubis 1,000,000 Apps Later A View on Current Android Malware - - PowerPoint PPT Presentation
Andrubis 1,000,000 Apps Later A View on Current Android Malware Behaviors Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van der Veen, Christian Platzer Vienna University of
Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor van der Veen, Christian Platzer
University of California, Santa Barbara VU University Amsterdam
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 1
McAfee Labs Threats Report June 2014 TrendMicro: The Mobile Landscape Roundup 1H 2014
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 2
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 3
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 4
§ As a web service: https://anubis.iseclab.org § For batch submissions via API: http://anubis.iseclab.org/Resources/submit_to_anubis.py § As a mobile app: https://play.google.com/store/apps/details?id=org.iseclab.andrubis
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 5
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 6
APK File Dynamic Analysis Emulator Android OS Dalvik VM Analysis Report Static Analysis Auxiliary Analysis Network Protocols …
7
§ Requested permissions § Activities § Services § Registered Broadcast Receivers
§ Used permissions § Use of DEX and native code loading
8
§ Log file system, network, phone (calls & SMS), crypto and dynamic code loading activity
§ Invoke all Activities, Services and Broadcast Receivers § Simulate common events (e.g. SMS receipt) § Application Exerciser Monkey
9
§ Basic code coverage computation § Permissions actually used during dynamic analysis § Behavioral signatures and classification
§ Analysis of native libraries, e.g. root exploits
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 10
11
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 12
13
14
§ Main distribution vector for Android apps
15
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 16
17
18
19
20
21
22
§ Repackaging/posing as popular benign apps § Generic names (e.g, com.app.android)
23
24
25
§ New monetization vector (Cryptolocker)
26
§ Forwarding incoming SMS § Leaking contacts
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 27
Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS), September 2014 28
29
30