Publication Type
Journal Article
Version
publishedVersion
Publication Date
7-2017
Abstract
Although a previous paper shows that existing antimalware tools (AMTs) may have high detection rate, the report is based on existing malware and thus it does not imply that AMTs can effectively deal with future malware. It is desirable to have an alternative way of auditing AMTs. In our previous paper, we use malware samples from android malware collection GENOME to summarize a malware meta-model for modularizing the common attack behaviors and evasion techniques in reusable features. We then combine different features with an evolutionary algorithm, in which way we evolve malware for variants. Previous results have shown that the existing AMTs only exhibit detection rate of 20%–30% for 10 000 evolved malware variants. In this paper, based on the modularized attack features, we apply the dynamic code generation and loading techniques to produce malware, so that we can audit the AMTs at runtime. We implement our approach, named MYSTIQUE-S, as a serviceoriented malware generation system. MYSTIQUE-S automatically selects attack features under various user scenarios and delivers the corresponding malicious payloads at runtime. Relying on dynamic code binding (via service) and loading (via reflection) techniques, MYSTIQUE-S enables dynamic execution of payloads on user devices at runtime. Experimental results on real-world devices show that existing AMTs are incapable of detecting most of our generated malware. Last, we propose the enhancements for existing AMTs.
Keywords
Android feature model, defense capability, malware generation, dynamic loading, linear programming
Discipline
Programming Languages and Compilers | Software Engineering
Research Areas
Software and Cyber-Physical Systems
Publication
IEEE Transactions on Information Forensics and Security
Volume
12
Issue
7
First Page
1529
Last Page
1544
ISSN
1556-6013
Identifier
10.1109/TIFS.2017.2661723
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Citation
XUE, Yinxing; MENG, Guozhu; LIU, Yang; TAN, Tian Huat; CHEN, Hongxu; SUN, Jun; and ZHANG, Jie.
Auditing anti-malware tools by evolving Android malware and dynamic loading technique. (2017). IEEE Transactions on Information Forensics and Security. 12, (7), 1529-1544.
Available at: https://ink.library.smu.edu.sg/sis_research/4853
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1109/TIFS.2017.2661723