On locating malicious code in piggybacked Android apps

To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app co...

Full description

Saved in:
Bibliographic Details
Main Authors: LI, Li, LI, Daoyuan, BISSYANDE, Tegawende F., KLEIN, Jacques, CAI, Haipeng, LO, David, LE TRAON, Yves
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2017
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3914
https://ink.library.smu.edu.sg/context/sis_research/article/4916/viewcontent/101007_2Fs11390_017_1786_z.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4916
record_format dspace
spelling sg-smu-ink.sis_research-49162020-01-16T00:42:50Z On locating malicious code in piggybacked Android apps LI, Li LI, Daoyuan BISSYANDE, Tegawende F. KLEIN, Jacques CAI, Haipeng LO, David LE TRAON, Yves To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy@5 of 83.6% for such packages that are triggered through method invocations and an accuracy@5 of 82.2% for such packages that are triggered independently. 2017-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3914 info:doi/10.1007/s11390-017-1786-z https://ink.library.smu.edu.sg/context/sis_research/article/4916/viewcontent/101007_2Fs11390_017_1786_z.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Android piggybacked app malicious code HookRanker Programming Languages and Compilers Software Engineering
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Android
piggybacked app
malicious code
HookRanker
Programming Languages and Compilers
Software Engineering
spellingShingle Android
piggybacked app
malicious code
HookRanker
Programming Languages and Compilers
Software Engineering
LI, Li
LI, Daoyuan
BISSYANDE, Tegawende F.
KLEIN, Jacques
CAI, Haipeng
LO, David
LE TRAON, Yves
On locating malicious code in piggybacked Android apps
description To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy@5 of 83.6% for such packages that are triggered through method invocations and an accuracy@5 of 82.2% for such packages that are triggered independently.
format text
author LI, Li
LI, Daoyuan
BISSYANDE, Tegawende F.
KLEIN, Jacques
CAI, Haipeng
LO, David
LE TRAON, Yves
author_facet LI, Li
LI, Daoyuan
BISSYANDE, Tegawende F.
KLEIN, Jacques
CAI, Haipeng
LO, David
LE TRAON, Yves
author_sort LI, Li
title On locating malicious code in piggybacked Android apps
title_short On locating malicious code in piggybacked Android apps
title_full On locating malicious code in piggybacked Android apps
title_fullStr On locating malicious code in piggybacked Android apps
title_full_unstemmed On locating malicious code in piggybacked Android apps
title_sort on locating malicious code in piggybacked android apps
publisher Institutional Knowledge at Singapore Management University
publishDate 2017
url https://ink.library.smu.edu.sg/sis_research/3914
https://ink.library.smu.edu.sg/context/sis_research/article/4916/viewcontent/101007_2Fs11390_017_1786_z.pdf
_version_ 1770573934738014208