Abstract
Reflection is a language feature which allows to analyze and transform the behavior of classes at the runtime. Reflection is used for software debugging and testing. Malware authors can leverage re ection to subvert the malware de- tection by static analyzers. Re ection initializes the class, invokes any method of class, or accesses any field of class. But, instead of utilizing usual programming language syn- tax, reflection passes classes/methods etc. as parameters to reflective APIs. As a consequence, these parameters can be constructed dynamically or can be encrypted by malware. These cannot be detected by state-of-the-art static tools. We propose EspyDroid, a system that combines dynamic analysis with code instrumentation for a more precise and automated detection of malware employing re ection. Weflevaluate EspyDroid on 28 benchmark apps employing majorflre ection categories. Our technique show improved results over FlowDroid via detection of additional undetected ows. These flows have potential to leak sensitive and private in- formation of the users, through various sinks.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security |
Editors | Ahmad-Reza Sadeghi, Xun Yi |
Place of Publication | New York NY USA |
Publisher | Association for Computing Machinery (ACM) |
Pages | 911-913 |
Number of pages | 3 |
ISBN (Electronic) | 9781450349444 |
DOIs | |
Publication status | Published - 2017 |
Externally published | Yes |
Event | ACM Symposium on Information, Computer and Communications Security 2017 - Abu Dhabi, United Arab Emirates Duration: 2 Apr 2017 → 6 Apr 2017 Conference number: 12th https://dl.acm.org/doi/proceedings/10.1145/3052973 |
Conference
Conference | ACM Symposium on Information, Computer and Communications Security 2017 |
---|---|
Abbreviated title | AsiaCCS 2017 |
Country/Territory | United Arab Emirates |
City | Abu Dhabi |
Period | 2/04/17 → 6/04/17 |
Internet address |
Keywords
- Android
- Dynamic analysis
- Instrumentation
- Malware
- Reflection