Cargando…
On the evaluation of android malware detectors against code-obfuscation techniques
The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques. The obfuscation techniques are used to hide the malicious code in...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9299270/ https://www.ncbi.nlm.nih.gov/pubmed/35875645 http://dx.doi.org/10.7717/peerj-cs.1002 |
_version_ | 1784750928230875136 |
---|---|
author | Nawaz, Umair Aleem, Muhammad Lin, Jerry Chun-Wei |
author_facet | Nawaz, Umair Aleem, Muhammad Lin, Jerry Chun-Wei |
author_sort | Nawaz, Umair |
collection | PubMed |
description | The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques. The obfuscation techniques are used to hide the malicious code in the Android applications to evade detection by anti-malware tools. Some attackers use the obfuscation techniques in isolation, while some attackers use a mixed approach (i.e., employing multiple obfuscation techniques simultaneously). Therefore, it is crucial to analyze the impact of the different obfuscation techniques, both when they are used in isolation and when they are combined as hybrid techniques. Several studies have suggested that the obfuscation techniques may be more effective when used in a mixed pattern. However, in most of the related works, the obfuscation techniques used for analysis are either based on individual or a combination of primitive obfuscation techniques. In this work, we provide a comprehensive evaluation of anti-malware tools to gauge the impact of complex hybrid code-obfuscations techniques on malware detection capabilities of the prominent anti-malware tools. The evaluation results show that the inter-category-wise hybridized code obfuscation results in more evasion as compared to the individual or simple hybridized code obfuscations (using multiple and similar code obfuscations) which most of the existing related work employed for the evaluation. Obfuscation techniques significantly impact the detection rate of any anti-malware tool. The remarkable result i.e., almost 100% best detection rate is observed for the seven out of 10 tools when analyzed using the individual obfuscation techniques, four out of 10 tools on category-wise obfuscation, and not a single anti-malware tool attained full detection (i.e., 100%) for inter-category obfuscations. |
format | Online Article Text |
id | pubmed-9299270 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-92992702022-07-21 On the evaluation of android malware detectors against code-obfuscation techniques Nawaz, Umair Aleem, Muhammad Lin, Jerry Chun-Wei PeerJ Comput Sci Computer Networks and Communications The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques. The obfuscation techniques are used to hide the malicious code in the Android applications to evade detection by anti-malware tools. Some attackers use the obfuscation techniques in isolation, while some attackers use a mixed approach (i.e., employing multiple obfuscation techniques simultaneously). Therefore, it is crucial to analyze the impact of the different obfuscation techniques, both when they are used in isolation and when they are combined as hybrid techniques. Several studies have suggested that the obfuscation techniques may be more effective when used in a mixed pattern. However, in most of the related works, the obfuscation techniques used for analysis are either based on individual or a combination of primitive obfuscation techniques. In this work, we provide a comprehensive evaluation of anti-malware tools to gauge the impact of complex hybrid code-obfuscations techniques on malware detection capabilities of the prominent anti-malware tools. The evaluation results show that the inter-category-wise hybridized code obfuscation results in more evasion as compared to the individual or simple hybridized code obfuscations (using multiple and similar code obfuscations) which most of the existing related work employed for the evaluation. Obfuscation techniques significantly impact the detection rate of any anti-malware tool. The remarkable result i.e., almost 100% best detection rate is observed for the seven out of 10 tools when analyzed using the individual obfuscation techniques, four out of 10 tools on category-wise obfuscation, and not a single anti-malware tool attained full detection (i.e., 100%) for inter-category obfuscations. PeerJ Inc. 2022-06-21 /pmc/articles/PMC9299270/ /pubmed/35875645 http://dx.doi.org/10.7717/peerj-cs.1002 Text en © 2022 Nawaz et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Computer Networks and Communications Nawaz, Umair Aleem, Muhammad Lin, Jerry Chun-Wei On the evaluation of android malware detectors against code-obfuscation techniques |
title | On the evaluation of android malware detectors against code-obfuscation techniques |
title_full | On the evaluation of android malware detectors against code-obfuscation techniques |
title_fullStr | On the evaluation of android malware detectors against code-obfuscation techniques |
title_full_unstemmed | On the evaluation of android malware detectors against code-obfuscation techniques |
title_short | On the evaluation of android malware detectors against code-obfuscation techniques |
title_sort | on the evaluation of android malware detectors against code-obfuscation techniques |
topic | Computer Networks and Communications |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9299270/ https://www.ncbi.nlm.nih.gov/pubmed/35875645 http://dx.doi.org/10.7717/peerj-cs.1002 |
work_keys_str_mv | AT nawazumair ontheevaluationofandroidmalwaredetectorsagainstcodeobfuscationtechniques AT aleemmuhammad ontheevaluationofandroidmalwaredetectorsagainstcodeobfuscationtechniques AT linjerrychunwei ontheevaluationofandroidmalwaredetectorsagainstcodeobfuscationtechniques |