Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps
Hidden sensitive operations (HSO) such as stealing privacy user data upon receiving an SMS message are increasingly utilized by mobile malware and other potentially-harmful apps (PHAs) to evade detection. Identification of such behaviors is hard, due to the challenge in triggering them during an app...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/8173 https://ink.library.smu.edu.sg/context/sis_research/article/9176/viewcontent/ndss2017_05A_1_Pan_paper__2_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-9176 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-91762023-09-26T10:31:40Z Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps PAN, Xiaorui WANG, Xueqiang DUAN, Yue WANG, Xiaofeng YIN, Heng Hidden sensitive operations (HSO) such as stealing privacy user data upon receiving an SMS message are increasingly utilized by mobile malware and other potentially-harmful apps (PHAs) to evade detection. Identification of such behaviors is hard, due to the challenge in triggering them during an app’s runtime. Current static approaches rely on the trigger conditions or hidden behaviors known beforehand and therefore cannot capture previously unknown HSO activities. Also these techniques tend to be computationally intensive and therefore less suitable for analyzing a large number of apps. As a result, our understanding of real-world HSO today is still limited, not to mention effective means to mitigate this threat. In this paper, we present HSOMINER, an innovative machinelearning based program analysis technique that enables a largescale discovery of unknown HSO activities. Our approach leverages a set of program features that characterize an HSO branch1 and can be relatively easy to extract from an app. These features summarize a set of unique observations about an HSO condition, its paths and the relations between them, and are designed to be general for finding hidden suspicious behaviors. Particularly, we found that a trigger condition is less likely to relate to the path of its branch through data flows or shared resources, compared with a legitimate branch. Also, the behaviors exhibited by the two paths of an HSO branch tend to be conspicuously different (innocent on one side and sinister on the other). Most importantly, even though these individual features are not sufficiently accurate for capturing HSO on their own, collectively they are shown to be highly effective in identifying such behaviors. This differentiating power is harnessed by HSOMINER to classify Android apps, which achieves a high precision (>98%) and coverage (>94%), and is also efficient as discovered in our experiments. The new tool was further used in a measurement study involving 338,354 realworld apps, the largest one ever conducted on suspicious hidden operations. Our research brought to light the pervasiveness of HSO activities, which are present in 18.7% of the apps we analyzed, surprising trigger conditions (e.g., click on a certain region of a view) and behaviors (e.g., hiding operations in a dynamically generated receiver), which help better understand the problem and contribute to more effective defense against this new threat to the mobile platform. 2017-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/8173 info:doi/10.14722/ndss.2017.23265 https://ink.library.smu.edu.sg/context/sis_research/article/9176/viewcontent/ndss2017_05A_1_Pan_paper__2_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Databases and Information Systems OS and Networks |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Databases and Information Systems OS and Networks |
spellingShingle |
Databases and Information Systems OS and Networks PAN, Xiaorui WANG, Xueqiang DUAN, Yue WANG, Xiaofeng YIN, Heng Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps |
description |
Hidden sensitive operations (HSO) such as stealing privacy user data upon receiving an SMS message are increasingly utilized by mobile malware and other potentially-harmful apps (PHAs) to evade detection. Identification of such behaviors is hard, due to the challenge in triggering them during an app’s runtime. Current static approaches rely on the trigger conditions or hidden behaviors known beforehand and therefore cannot capture previously unknown HSO activities. Also these techniques tend to be computationally intensive and therefore less suitable for analyzing a large number of apps. As a result, our understanding of real-world HSO today is still limited, not to mention effective means to mitigate this threat. In this paper, we present HSOMINER, an innovative machinelearning based program analysis technique that enables a largescale discovery of unknown HSO activities. Our approach leverages a set of program features that characterize an HSO branch1 and can be relatively easy to extract from an app. These features summarize a set of unique observations about an HSO condition, its paths and the relations between them, and are designed to be general for finding hidden suspicious behaviors. Particularly, we found that a trigger condition is less likely to relate to the path of its branch through data flows or shared resources, compared with a legitimate branch. Also, the behaviors exhibited by the two paths of an HSO branch tend to be conspicuously different (innocent on one side and sinister on the other). Most importantly, even though these individual features are not sufficiently accurate for capturing HSO on their own, collectively they are shown to be highly effective in identifying such behaviors. This differentiating power is harnessed by HSOMINER to classify Android apps, which achieves a high precision (>98%) and coverage (>94%), and is also efficient as discovered in our experiments. The new tool was further used in a measurement study involving 338,354 realworld apps, the largest one ever conducted on suspicious hidden operations. Our research brought to light the pervasiveness of HSO activities, which are present in 18.7% of the apps we analyzed, surprising trigger conditions (e.g., click on a certain region of a view) and behaviors (e.g., hiding operations in a dynamically generated receiver), which help better understand the problem and contribute to more effective defense against this new threat to the mobile platform. |
format |
text |
author |
PAN, Xiaorui WANG, Xueqiang DUAN, Yue WANG, Xiaofeng YIN, Heng |
author_facet |
PAN, Xiaorui WANG, Xueqiang DUAN, Yue WANG, Xiaofeng YIN, Heng |
author_sort |
PAN, Xiaorui |
title |
Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps |
title_short |
Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps |
title_full |
Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps |
title_fullStr |
Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps |
title_full_unstemmed |
Dark hazard: Large-scale discovery of unknown hidden sensitive operations in Android apps |
title_sort |
dark hazard: large-scale discovery of unknown hidden sensitive operations in android apps |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/8173 https://ink.library.smu.edu.sg/context/sis_research/article/9176/viewcontent/ndss2017_05A_1_Pan_paper__2_.pdf |
_version_ |
1779157191192739840 |