Giuseppe Crincoli, Tiziano Marinaro, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
International Conference on Advanced Information Networking and Applications
AINA 2020: Advanced Information Networking and Applications pp 1368-1382
https://doi.org/10.1007/978-3-030-44041-1_116
As evidenced from current literature in software security, the current signature detection mechanisms can be easily evaded by attackers simply applying trivial obfuscation techniques, usually with software engines able to automatically inject junk code into malicious applications. In fact, the employment of obfuscation code techniques is adopted by attackers to generate several (undetected) variants of one malicious sample, making its signature obsolete. Considering that the signature definition is a laborious process manually performed by security analysts, in this paper we propose a method, exploiting weak bisimulation, to detect whether an Android application is modified by means of the code reordering obfuscation technique. We present an experimental analysis performed on a real-world data-set of Android applications (obfuscated and not obfuscated), reaching interesting results in the code reordering obfuscation technique detection.
Cyberwatching.eu has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740129. The content of this website does not represent the opinion of the European Commission, and the European Commission is not responsible for any use that might be made of such content. Privacy Policy | Disclaimer / Terms and Conditions of Use