Please use this identifier to cite or link to this item:
Title: AndroNeo : hardening Android malware sandboxes by predicting evasion heuristics
Authors: Leguesse, Yonas
Vella, Mark Joseph
Ellul, Joshua
Keywords: Operating systems (Computers)
Android (Electronic resource)
Malware (Computer software)
Mobile computing
Smartphones -- Security measures
Issue Date: 2017
Publisher: Springer
Citation: Leguesse, Y., Vella, M., & Ellul, J. (2017, September). AndroNeo : Hardening Android malware sandboxes by predicting evasion heuristics. In IFIP International Conference on Information Security Theory and Practice (pp. 140-152). Springer, Cham.
Abstract: Sophisticated Android malware families often implement techniques aimed at avoiding detection. Split personality malware for example, behaves benignly when it detects that it is running on an analysis environment such as a malware sandbox, and maliciously when running on a real user’s device. These kind of techniques are problematic for malware analysts, often rendering them unable to detect or understand the malicious behaviour. This is where sandbox hardening comes into play. In our work, we exploit sandbox detecting heuristic prediction to predict and automatically generate bytecode patches, in order to disable the malware’s ability to detect a malware sandbox. Through the development of AndroNeo, we demonstrate the feasibility of our approach by showing that the heuristic prediction basis is a solid starting point to build upon, and demonstrating that when heuristic prediction is followed by bytecode patch generation, split personality can be defeated.
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
AndroNeo__Hardening_Android_malware_sandboxes_by_predicting_evasion_heuristics(2017).pdf624.75 kBAdobe PDFView/Open

Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.