2016 IEEE Symposium on Security and Privacy (SP) 2016
DOI: 10.1109/sp.2016.30
|View full text |Cite
|
Sign up to set email alerts
|

TriggerScope: Towards Detecting Logic Bombs in Android Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
115
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 124 publications
(118 citation statements)
references
References 26 publications
2
115
0
1
Order By: Relevance
“…In this example, it is obvious that the infected version of the application is subscribing to a notification service that will be triggered by the Android OS whenever the BOOT_COMPLETED event occurs. In addition, SMS_RECEIVED allows the subscriber to access all incoming SMS messages [14]. While the former action is used by the malware as a form of evasion, the latter is used to steal the Transaction Authorization Code (TAC) [15] [16].…”
Section: Introductionmentioning
confidence: 99%
“…In this example, it is obvious that the infected version of the application is subscribing to a notification service that will be triggered by the Android OS whenever the BOOT_COMPLETED event occurs. In addition, SMS_RECEIVED allows the subscriber to access all incoming SMS messages [14]. While the former action is used by the malware as a form of evasion, the latter is used to steal the Transaction Authorization Code (TAC) [15] [16].…”
Section: Introductionmentioning
confidence: 99%
“…In past years, symbolic execution has made big progress. Several static approaches (such as Intellidroid [39] and TriggerScope [18]) were proposed to vet Android apps using symbolic execution. However, these static approaches may have both higher false positives and negatives in the context faced in this paper.…”
Section: Eoe Countermeasure Discussionmentioning
confidence: 99%
“…For defeating dynamic tools, malicious applications contain countermeasures for interacting and testing their environment: emulators can be detected because of the lack of hardware components or because emulation side-effects [14]; reconnaissance techniques can recognize known analysis tools; logic bombs may encapsulate the payload and prevent its execution [4]; malicious code may require that the user uses the graphical interface of the application. Thus, any fully automated experiment on a dataset may suffer from these countermeasures and there are little chances to observe the dynamic behavior of a malware sample at runtime.…”
Section: A Lessons Learned From Manual Investigationmentioning
confidence: 99%