• Aucun résultat trouvé

Using Implicit Calls to Improve Malware Dynamic Execution

N/A
N/A
Protected

Academic year: 2021

Partager "Using Implicit Calls to Improve Malware Dynamic Execution"

Copied!
2
0
0

Texte intégral

(1)

HAL Id: hal-01304326

https://hal.archives-ouvertes.fr/hal-01304326

Submitted on 19 May 2016

HAL is a multi-disciplinary open access

archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Using Implicit Calls to Improve Malware Dynamic Execution

Mourad Leslous, Jean-François Lalande, Valérie Viet Triem Tong

To cite this version:

Mourad Leslous, Jean-François Lalande, Valérie Viet Triem Tong. Using Implicit Calls to Improve Malware Dynamic Execution. 37th IEEE Symposium on Security and Privacy, May 2016, San Jose, United States. �hal-01304326�

(2)

Using Implicit Calls to Improve Malware

Dynamic Execution

M. Leslous

J.-F. Lalande

V. Viet Triem Tong

INRIA/CENTRALESUPELEC research project Cidre – INSA CVL

France

Dynamic Analysis: The Need for Malware Triggering

I Malware evade dynamic analysis

I Wait for: a specific time, an event, C&C command

I If suspicious code is triggered

−→ Capture dynamic behavior

GroddDroid: a Gorilla for Triggering Malicious Behaviors

I

Locates the

suspicious

code

I

Builds an interprocedural control flow graph

I

Finds a path that reaches the suspicious code

I

Instruments & Executes APK

Problem: Execution paths May Use Implicit Calls

I Alarm Controller (com.al.alarm.controller)

I SHA256: 03c32aca9f894b8a7263e65fd8845a53618f1131877ccb818d018e2d07e2f596

I Decrypts and loads code dynamically I Installs malicious apps

I Displays unwanted ads

I Malicious code execution path contains an implicit call:

AsyncTask.execute() 99K AsyncTask.doInBackground()

I GroddDroid cannot find such a path because of implicit calls

Challenge

Discover execution paths with implicit calls to reach

suspicious

code

Including Implicit Calls into CFGs

I Without implicit calls

I Suspicious code execution rate for this sample: 37.5%

Malicious code NOT reached Framework MainActivity.onCreate() AsyncTask.execute() AsyncTask.doInBackground() −→ Explicit call 99K Implicit call

I Use pairs of registration-callback

I Suspicious code execution rate for this sample: 87.5%

Malicious code reached Framework MainApplication.onCreate() AsyncTask.execute() AsyncTask.doInBackground() −→ Explicit call 99K Implicit call

Executing Malware

I Program designed and implemented

I Experiments on large sets of malware

I Measure malicious code coverage with and without implicit calls I Online malware analysis platform

Références

Documents relatifs

We describe a detection specification as a model that com- bines a number of signatures, where each signature is formed from atoms that represent basic program operations in

The pro- posed comprehensive framework distinguishes three broad categories of fac- tors underlying the IDR for household adoption of energy-efficient technologies (EETs):

First, their study revealed that the malicious payload is regularly hidden behind implicit control flow calls (i.e. flows occurring when the Android framework calls a method

Our contribution in this work is the analysis of how the performance of text classifiers vary with the number of assembly code instructions used to represent each binary.. We find

The evaluation process for the degree of membership of malicious program to a malware class is based on the difference between the number of API calls performed

In the case of implicit feedback, the intention is to seek a correlation between the information that can be inferred from the data and the relevance judgments provided by users,

Concrètement, cela signifie que si un jugement mixte est signifié mais que l’appel n’est pas exercé à temps, il sera toujours possible d’attendre le jugement définitif

Our experiments aim at: (i) pinpointing the graph metrics corre- sponding to better SCDGs for malware classification; (ii) explaining how heuristics affect the quality of the