Title :
Divide-and-Conquer: Why Android Malware Cannot Be Stopped
Author :
Maier, David ; Muller, Tim ; Protsenko, Mykola
Author_Institution :
Friedrich-Alexander-Univ. Erlangen-Nurnberg, Erlangen, Germany
Abstract :
In this paper, we demonstrate that Android malware can bypass all automated analysis systems, including AV solutions, mobile sandboxes, and the Google Bouncer. We propose a tool called Sand-Finger for the fingerprinting of Android-based analysis systems. By analyzing the fingerprints of ten unique analysis environments from different vendors, we were able to find characteristics in which all tested environments differ from actual hardware. Depending on the availability of an analysis system, malware can either behave benignly or load malicious code at runtime. We classify this group of malware as Divide-and-Conquer attacks that are efficiently obfuscated by a combination of fingerprinting and dynamic code loading. In this group, we aggregate attacks that work against dynamic as well as static analysis. To demonstrate our approach, we create proof-of-concept malware that surpasses up-to-date malware scanners for Android. We also prove that known malware samples can enter the Google Play Store by modifying them only slightly. Due to Android´s lack of an API for malware scanning at runtime, it is impossible for AV solutions to secure Android devices against these attacks.
Keywords :
Android (operating system); divide and conquer methods; invasive software; mobile computing; program diagnostics; API; AV solutions; Android malware; Android-based analysis system fingerprinting; Google Bouncer; Google Play Store; Sand-Finger; automated analysis systems; divide-and-conquer attacks; dynamic code loading; malicious code; malware scanning; mobile sandboxes; proof-of-concept malware; static analysis; Androids; Google; Hardware; Humanoid robots; Malware; Mobile communication; Smart phones; AV; Android Malware; Google Bouncer; Mobile Sandboxes; Obfuscation; Static and Dynamic Analysis;
Conference_Titel :
Availability, Reliability and Security (ARES), 2014 Ninth International Conference on
Conference_Location :
Fribourg
DOI :
10.1109/ARES.2014.12