Security of Android devices is now paramount, given their wide adoption among consumers. As researchers develop tools for statically or dynamically detecting suspicious apps, malware writers regularly update their attack mechanisms to hide malicious behavior implementation. This poses two problems to current research techniques: static analysis approaches, given their over-approximations, can report an overwhelming number of false alarms, while dynamic approaches will miss those behaviors that are hidden through evasion techniques. We propose in this work a static approach specifically targeted at highlighting hidden sensitive operations, mainly sensitive data flows. The prototype version of HiSenDroid has been evaluated on a large-scale dataset of thousands of malware and goodware samples on which it successfully revealed anti-analysis code snippets aiming at evading detection by dynamic analysis. We further experimentally show that, with FlowDroid, some of the hidden sensitive behaviors would eventually lead to private data leaks. Those leaks would have been hard to spot either manually among the large number of false positives reported by the state of the art static analyzers, or by dynamic tools. Overall, by putting the light on hidden sensitive operations, HiSenDroid helps security analysts in validating potential sensitive data operations, which would be previously unnoticed.
翻译:Android装置的安全现在至关重要, 因为他们在消费者中被广泛采用。 当研究人员开发静态或动态地探测可疑软件的工具时, 恶意软件作者定期更新其攻击机制, 以隐藏恶意行为的实施。 这给当前的研究技术带来了两个问题: 静态分析方法, 因为他们过于接近, 能够报告大量虚假的警报, 而动态方法会忽略通过规避技术隐藏的那些行为。 我们在此工作中建议一种静态方法, 具体针对突出隐藏的敏感操作, 主要是敏感数据流。 HisenDroid原型版本已经在一个由数千件恶意软件和好软件样本组成的大规模数据集上进行了评估, 并成功揭示了旨在通过动态分析来逃避检测的反分析代码片。 我们进一步实验性地表明, 有了FlookDroid, 一些隐藏的敏感行为最终会导致私人数据泄漏。 这些泄漏将很难在艺术静态分析器状态或动态工具所报告的大量虚假阳性数据中找到。 总的来说, 通过对隐藏的敏感操作进行光, HisenDroid 能够帮助安全分析, 之前的敏感性数据分析师成为有效的潜在。