Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23066
|View full text |Cite
|
Sign up to set email alerts
|

Harvesting Runtime Values in Android Applications That Feature Anti-Analysis Techniques

Abstract: It is generally challenging to tell apart malware from benign applications. To make this decision, human analysts are frequently interested in runtime values: targets of reflective method calls, URLs to which data is sent, target telephone numbers of SMS messages, and many more. However, obfuscation and string encryption, used by malware as well as goodware, often not only render human inspections, but also static analyses ineffective. In addition, malware frequently tricks dynamic analyses by detecting the ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
72
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 114 publications
(74 citation statements)
references
References 47 publications
0
72
0
Order By: Relevance
“…Harvester [74] combines static and dynamic analyses to combat malware obfuscation. Resolution of reflective calls is done by the dynamic analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Harvester [74] combines static and dynamic analyses to combat malware obfuscation. Resolution of reflective calls is done by the dynamic analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Runtime values extraction Harvester [32] is a new system intended to dynamically extract runtime values. Since it is based on a cyclical combination of slicing and code execution, it can extract values regardless of any possible encryption, obfuscation or other anti-analysis techniques applied to them.…”
Section: Related Workmentioning
confidence: 99%
“…As indicated by [11], some sensitive runtime data (or parameter values of API methods) in Android apps can actually be used for identifying malicious apps. Indeed, as shown in Section III-C, many sensitive parameter values are actually used in many samples, making them good candidates for blacklisting.…”
Section: E Parameter Values For Malware Identificationmentioning
confidence: 99%
“…One of the most sophisticated ones is Harvester [11], which is dedicated to extract runtime values from any position in the Android code. Although it is not the focus, Harvester could be also leveraged to extract the parameter values from all the Android API methods in Android apps.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation