2016
DOI: 10.1007/s11416-016-0282-2
|View full text |Cite
|
Sign up to set email alerts
|

Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
35
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(36 citation statements)
references
References 12 publications
1
35
0
Order By: Relevance
“…The current generation of malware detectors are incapable of handling encryption in the body of malware. This experiment reiterates this fact and supports the conclusions drawn by Preda et al in[17]. The conclusions drawn by them indicating a huge gap in the requirement and the availability of sophisticated anti-virus products is still very much prevalent.8.2 Future WorkSimilar to the obfuscators employed in this experiment, it should be possible to create ''de-obfuscators'' for Android files.…”
supporting
confidence: 86%
See 2 more Smart Citations
“…The current generation of malware detectors are incapable of handling encryption in the body of malware. This experiment reiterates this fact and supports the conclusions drawn by Preda et al in[17]. The conclusions drawn by them indicating a huge gap in the requirement and the availability of sophisticated anti-virus products is still very much prevalent.8.2 Future WorkSimilar to the obfuscators employed in this experiment, it should be possible to create ''de-obfuscators'' for Android files.…”
supporting
confidence: 86%
“…For this project, we use a tool called AAMO (Another Android Malware Obfuscator) [17]. This tool gives us various obfuscators for use with our experimentations.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We next take a subset of apps for both malware and benign and run them through three obfuscation tools. We choose as as our obfuscation tools: (1) the Automatic Android Malware Obfuscator (AAMO) [43] which has been used to demonstrate how virus detection tools perform against obfuscation, (2) DroidChameleon [44] also used to demonstrate the performance of virus detection tools in the presence of obfuscation, and (3) Obfuscapk [19] which is a recent, open source obfuscator with multiple advanced obfuscation configurations. We configured the obfuscators to use obfuscation techniques that Hammad et al [32] identified as challenging for virus detection methods.…”
Section: Obfuscated Appsmentioning
confidence: 99%
“…This strategy adds junk instructions which are not functional. For binaries, we can add no-operation instructions (NOP or 0x00) (Dalla Preda and Maggi 2017;Marcelli et al 2018). Besides, we can also add junk methods, such as adding defunct methods in Android smali codes (Dalla Preda and Maggi 2017).…”
Section: Junk Codesmentioning
confidence: 99%