skip to main content
10.1145/2590296.2590325acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Open Access

Evading android runtime analysis via sandbox detection

Published:04 June 2014Publication History

ABSTRACT

The large amounts of malware, and its diversity, have made it necessary for the security community to use automated dynamic analysis systems. These systems often rely on virtualization or emulation, and have recently started to be available to process mobile malware. Conversely, malware authors seek to detect such systems and evade analysis. In this paper, we present techniques for detecting Android runtime analysis systems. Our techniques are classified into four broad classes showing the ability to detect systems based on differences in behavior, performance, hardware and software components, and those resulting from analysis system design choices. We also evaluate our techniques against current publicly accessible systems, all of which are easily identified and can therefore be hindered by a motivated adversary. Our results show some fundamental limitations in the viability of dynamic mobile malware analysis platforms purely based on virtualization.

References

  1. AMAT: Android Malware Analysis Toolkit. http://sourceforge.net/projects/amatlinux/.Google ScholarGoogle Scholar
  2. Andrubis. http://anubis.iseclab.org/.Google ScholarGoogle Scholar
  3. CopperDroid. http://copperdroid.isg.rhul.ac.uk/copperdroid/.Google ScholarGoogle Scholar
  4. DroidBox. https://code.google.com/p/droidbox/.Google ScholarGoogle Scholar
  5. Droidbox device identifier patch. https://code.google.com/p/droidbox/source/browse/trunk/droidbox23/framework_base.patch?r=82.Google ScholarGoogle Scholar
  6. Foresafe. http://www.foresafe.com/scan.Google ScholarGoogle Scholar
  7. mobile-sandbox. http://mobilesandbox.org/.Google ScholarGoogle Scholar
  8. Monitoring the Battery Level and Charging State | Android Developers. http://developer.android.com/training/monitoring-device-state/battery-monitoring.html.Google ScholarGoogle Scholar
  9. North American Numbering Plan Adminstration search. www.nanpa.com/enas/area_code_query.do.Google ScholarGoogle Scholar
  10. SandDroid. http://sanddroid.xjtu.edu.cn/.Google ScholarGoogle Scholar
  11. Using the Android Emulator | Android Developers. http://developer.android.com/tools/devices/emulator.html.Google ScholarGoogle Scholar
  12. U. Bayer, P. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, behavior-based malware clustering. In NDSS, 2009.Google ScholarGoogle Scholar
  13. T. Blasing, L. Batyuk, A. Schmidt, S. Camtepe, and S. Albayrak. An android application sandbox system for suspicious software detection. In MALWARE'10, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  14. D. J. Chaboya, R. A. Raines, R. O. Baldwin, and B. E. Mullins. Network intrusion detection: automated and manual methods prone to attack and evasion. Security & Privacy, IEEE, 4(6):36--43, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. In Dependable Systems and Networks With FTCS and DCC, 2008. IEEE International Conference on, pages 177--186, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  16. H. Dreger, A. Feldmann, V. Paxson, and R. Sommer. Operational experiences with high-volume network intrusion detection. In Proc. CCS, pages 2--11. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. F. and P. Schulz. Detecting android sandboxes, Aug 2012. https://www.dexlabs.org/blog/btdetect.Google ScholarGoogle Scholar
  18. A. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner. A survey of mobile malware in the wild. In Proc. SPSM, pages 3--14. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Ferrie. Attacks on more virtual machine emulators. Symantec Technology Exchange, 2007.Google ScholarGoogle Scholar
  20. P. Fogla and W. Lee. Evading network anomaly detection systems: formal reasoning and practical techniques. In Proc. CCS, pages 59--68. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proc. USENIX Security, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. T. Holz and F. Raynal. Detecting honeypots and other suspicious environments. In Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC, pages 29--36. IEEE, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  23. P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh, and D. Wetherall. A conundrum of permissions: Installing applications on an android smartphone. In USEC'12, pages 68--79. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. B. Lau and V. Svajcer. Measuring virtual machine detection in malware using dsd tracer. Journal in Computer Virology, 6(3):181--195, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  25. H. Lockheimer. Android and Security, Feb 2012. http://googlemobile.blogspot.com/2012/02/android-and-security.html.Google ScholarGoogle Scholar
  26. A. Moser, C. Kruegel, and E. Kirda. Exploring multiple execution paths for malware analysis. In Security and Privacy, 2007. SP'07. IEEE Symposium on, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Mutz, G. Vigna, and R. Kemmerer. An experience developing an ids stimulator for the black-box testing of network intrusion detection systems. In Computer Security Applications Conference, 2003. Proceedings. 19th Annual, pages 374--383. IEEE, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Oberheide and C. Miller. Dissecting the android bouncer. SummerCon2012, New York, 2012.Google ScholarGoogle Scholar
  29. T. Ooura. Improvement of the pi calculation algorithm and implementation of fast multiple precision computation. Transactions-Japan Society for Industrial and Applied Mathematics, 9(4):165--172, 1999.Google ScholarGoogle Scholar
  30. R. Paleari, L. Martignoni, G. F. Roglia, and D. Bruschi. A fistful of red-pills: How to automatically generate procedures to detect cpu emulators. In Proc. WOOT, volume 41, page 86. USENIX, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. N. J. Percoco and S. Schulte. Adventures in bouncerland. Black Hat USA, 2012.Google ScholarGoogle Scholar
  32. T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, DTIC Document, 1998.Google ScholarGoogle Scholar
  33. T. Raffetseder, C. Krügel, and E. Kirda. Detecting system emulators. In Information Security. Springer, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. J. Rutkowska. Red pill... or how to detect vmm using (almost) one cpu instruction. Invisible Things, 2004.Google ScholarGoogle Scholar
  35. T. Strazzere. Dex education 201 anti-emulation, Sept 2013. http://hitcon.org/2013/download/TimStrazzere-DexEducation.pdf.Google ScholarGoogle Scholar
  36. T. Vidas and N. Christin. Sweetening android lemon markets: measuring and combating malware in application marketplaces. In Proc. 3rd CODASPY, pages 197--208. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. T. Vidas, D. Votipka, and N. Christin. All your droid are belong to us: A survey of current android attacks. In Proc. WOOT. USENIX, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. T. Vidas, C. Zhang, and N. Christin. Toward a general collection methodology for android devices. DFRWS'11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. Security & Privacy, IEEE, 5(2):32--39, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In Proc. IEEE Symp. on Security and Privacy, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proc. NDSS, 2012.Google ScholarGoogle Scholar

Index Terms

  1. Evading android runtime analysis via sandbox detection

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications security
        June 2014
        556 pages
        ISBN:9781450328005
        DOI:10.1145/2590296

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 June 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        ASIA CCS '14 Paper Acceptance Rate50of255submissions,20%Overall Acceptance Rate418of2,322submissions,18%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader