Dissecting Android Malware: Characterization and Evolution
1
Dissecting Android Malware: Characterization and Evolution 1 - - PowerPoint PPT Presentation
Dissecting Android Malware: Characterization and Evolution 1 Problems to solve 18 Requirement 1: Sufficient Malware data set Anti Virus Communities or Researchers are hampered by the lack of malware data set. Req equires a a suf
Dissecting Android Malware: Characterization and Evolution
1
Problems to solve
18
Requirement 1: Sufficient Malware data set
Anti Virus Communities or Researchers are hampered by the lack of malware data set. Req equires a a suf ufficient Andr droid malware da dataset.
19
How good are top anti-virus software against latest Android malware? Evaluating effectiveness of current Anti-virus software
Requirement 2: Current Malware Detection Rate
20
Related work
in the wild”
– Survey 46 malware samples on iOS, Android and Symbian – Choice of breadth over depth – No mention of advanced trojans in the wild
21
Related work
What was missing?
– A technical analysis of advanced attacks
– Perhaps A/V companies missed stuff? E.g. Malware in third-party markets
defense
22
Contribution
– 1260 different samples in all – 49 different families each with many variants – More info: http://www.malgenomeproject.org/
23
Malware dataset
24
How was it collected?
Malware dataset
25
Search for android id mark rketplace cra rawler
Contribution
– Provenance, Design, Harm
26
Inst Installatio ion Ac Activ ivatio ion Cha Characteris isatio ion
Malware: Provenance
– Eoemarket – Gfan
27
‡
‡ http://thedroidguy.com/2012/04/android- market-share-doubles-in-china-even-symbian- is-ahead-of-ios/Malware: Provenance
Month of the year
28
Number of new malware families discovered Third-party store only Official store
Malware: Installation
How to lure users into installing malware you have written? OR How do bad things happen to good people?
29
Repackaging
30
App developer (Good guy) Monkey Bowl Official Android market Repackage Meister (bad guy) Third-party market End-user
Repackaging
31
86% of malware samples repackage!
Repackaging
32
Update attack
33
Google SSearch DroidKungFu
Source: https://www.mylookout.com/mobile- threat-reportPayload FinanceAccount.apk
Update attack
34
Payload Original Benign app Encrypted blog entry: blog.sina.com.cn AnserverBot
Drive-by download
35
In-app ad pop-up
Source: https://www.mylookout.com/mobile- threat-reportMalware: Activation
When do bad things happen?
– Phone boots up
– SMS is received
– Host app is started
36
Malware: Purpose
What do they do?
37
Source: http://www.textspyware.com/android/android-spyware-software/Malware: Purpose
38
– Device ID – Phone number/operator – User’s email addresses
http://www.fortiguard.com/av/VID3148366
SndApp
Malware: Purpose
39
http://www.f-secure.com/weblog/archives/00002305.html
FakeRegSMS.B
Malware: Design
server (93%)
– Exploit security flaws in kernel code
40
Malware: Permission use
553=12.8x 398=11.7x 333=10.1x 457=6.43x 688=5.02x 424=3.72x 43 34 33 71 137 114
Frequency of top 20 permissions
Malware Benign app
41
Malware: Permission use
– Avg. no. of permissions per app
– Avg. no. of top 20 permissions per app
42
Contribution
– Advanced techniques to beat defense
43
Malware: Evolution
How are malware writers trying to evade detection?
– Payload and internal data
– DexClassLoader, Reflection
– Class name obfuscation
44
Malware: Detection Rate
54.7% 79.6% 20.2% 76.7% 10 20 30 40 50 60 70 80 90 100
45
AVG Lookout Norton Trend Micro A few malware samples went undetected!
Malware: Detection
NOT detected by any?
based detection!
46
Takeaways
Malware
(~90%)
needs to catch up
47
Future Work
How does one reduce the impact of malware?
48
Google’s “Bouncer”
Future work
Well, Google has a kill switch at least... ...But, what about third-party markets?
49
50
Making xkcd slightly worse: www.xkcdsw.com