Publication | Closed Access
Rage against the virtual machine
208
Citations
12
References
2014
Year
Unknown Venue
Mobile SecurityEngineeringEvasion TechniqueInformation SecurityComputer ArchitectureSoftware EngineeringSoftware AnalysisVirtual RealitySystem SoftwareDynamic Code AnalysisMobile MalwareVirtualization SupportComputer ScienceData SecuritySoftware SecurityProgram AnalysisSoftware TestingCloud ComputingExtended RealityEvasion TechniquesVirtualization ToolMalware AnalysisVirtual Machine
Antivirus companies, mobile application marketplaces, and the security research community, employ techniques based on dynamic code analysis to detect and analyze mobile malware. In this paper, we present a broad range of anti-analysis techniques that malware can employ to evade dynamic analysis in emulated Android environments. Our detection heuristics span three different categories based on (i) static properties, (ii) dynamic sensor information, and (iii) VM-related intricacies of the Android Emulator. To assess the effectiveness of our techniques, we incorporated them in real malware samples and submitted them to publicly available Android dynamic analysis systems, with alarming results. We found all tools and services to be vulnerable to most of our evasion techniques. Even trivial techniques, such as checking the value of the IMEI, are enough to evade some of the existing dynamic analysis frameworks. We propose possible countermeasures to improve the resistance of current dynamic analysis tools against evasion attempts.
| Year | Citations | |
|---|---|---|
Page 1
Page 1