Proceedings of the 3rd International Conference on Information Systems Security and Privacy 2017
DOI: 10.5220/0006094006100621
|View full text |Cite
|
Sign up to set email alerts
|

Glassbox: Dynamic Analysis Platform for Malware Android Applications on Real Devices

Abstract: Android is the most widely used smartphone OS with 82.8% market share in 2015 [1]. It is therefore the most widely targeted system by malware authors. To detect these malicious applications before they are installed on users phones, we need an automated analysis. Researchers rely on dynamic analysis to extract malware behaviors and often use emulators to do so. However, using emulators lead to new issues. Currently emulators cannot emulate SIM card, camera and microphone -components that are likely to be used … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…But it is easily evaded by malware that detects virtual environments. There are various strategies to circumvent dynamic analysis; the following strategies are used to determine the virtual environment [15]. It is noteworthy that using Google Bouncer, in 2015, more than 1 million users were harmed by malware using build.MODEL == "google_ sdk", the source code of the Brain Test malicious apps that bypassed Google Bouncer [16].…”
Section: A Problems With Android Malware Dynamic Analysismentioning
confidence: 99%
“…But it is easily evaded by malware that detects virtual environments. There are various strategies to circumvent dynamic analysis; the following strategies are used to determine the virtual environment [15]. It is noteworthy that using Google Bouncer, in 2015, more than 1 million users were harmed by malware using build.MODEL == "google_ sdk", the source code of the Brain Test malicious apps that bypassed Google Bouncer [16].…”
Section: A Problems With Android Malware Dynamic Analysismentioning
confidence: 99%
“…Several dynamic analysis tools for characterizing Android apps have been published in the literature. The majority of these rely on random-based test input generation using Monkey, for example, AASandbox [11], ANANAS [12], Mobile-Sandbox [13], vetDroid [14], TraceDroid [48], Andrubis [49], Dynalog [8], HADM [50], Maline [51], Glassbox [52], NetworkProfiler [53], Andlatis [54], Hu & Neamtiu [55], and Cai & Ryder [56]. Others such as AppsPlayground [38] used a more intelligent event generation technique, but unlike our paper, did not investigate code coverage capabilities in the context of on performance analysis of machine learning-based malware detection.…”
Section: Related Workmentioning
confidence: 99%
“…Their work highlighted the anti-emulator capabilities of malware which can be solved by using real devices. Glassbox [21] also presented a dynamic analysis platform for analysing Android malware on real devices. However, unlike the work presented in this paper, these studies have not addressed machine learning based detection on real devices.…”
Section: Related Workmentioning
confidence: 99%
“…Dynamic analysis tools that rely on emulators (or virtual devices) such as Dynalog [14] attempt to address the problem by changing properties of the environment to emulate a real phone as much as possible and to incorporate several behaviours to mimic a real phone. However, these methods whilst useful, have been shown to be insufficient to completely tackle anti-emulation [21], [22], [31] .…”
Section: Introductionmentioning
confidence: 99%