Cargando…

On the evaluation of android malware detectors against code-obfuscation techniques

The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques. The obfuscation techniques are used to hide the malicious code in...

Descripción completa

Detalles Bibliográficos
Autores principales: Nawaz, Umair, Aleem, Muhammad, Lin, Jerry Chun-Wei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9299270/
https://www.ncbi.nlm.nih.gov/pubmed/35875645
http://dx.doi.org/10.7717/peerj-cs.1002
_version_ 1784750928230875136
author Nawaz, Umair
Aleem, Muhammad
Lin, Jerry Chun-Wei
author_facet Nawaz, Umair
Aleem, Muhammad
Lin, Jerry Chun-Wei
author_sort Nawaz, Umair
collection PubMed
description The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques. The obfuscation techniques are used to hide the malicious code in the Android applications to evade detection by anti-malware tools. Some attackers use the obfuscation techniques in isolation, while some attackers use a mixed approach (i.e., employing multiple obfuscation techniques simultaneously). Therefore, it is crucial to analyze the impact of the different obfuscation techniques, both when they are used in isolation and when they are combined as hybrid techniques. Several studies have suggested that the obfuscation techniques may be more effective when used in a mixed pattern. However, in most of the related works, the obfuscation techniques used for analysis are either based on individual or a combination of primitive obfuscation techniques. In this work, we provide a comprehensive evaluation of anti-malware tools to gauge the impact of complex hybrid code-obfuscations techniques on malware detection capabilities of the prominent anti-malware tools. The evaluation results show that the inter-category-wise hybridized code obfuscation results in more evasion as compared to the individual or simple hybridized code obfuscations (using multiple and similar code obfuscations) which most of the existing related work employed for the evaluation. Obfuscation techniques significantly impact the detection rate of any anti-malware tool. The remarkable result i.e., almost 100% best detection rate is observed for the seven out of 10 tools when analyzed using the individual obfuscation techniques, four out of 10 tools on category-wise obfuscation, and not a single anti-malware tool attained full detection (i.e., 100%) for inter-category obfuscations.
format Online
Article
Text
id pubmed-9299270
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-92992702022-07-21 On the evaluation of android malware detectors against code-obfuscation techniques Nawaz, Umair Aleem, Muhammad Lin, Jerry Chun-Wei PeerJ Comput Sci Computer Networks and Communications The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques. The obfuscation techniques are used to hide the malicious code in the Android applications to evade detection by anti-malware tools. Some attackers use the obfuscation techniques in isolation, while some attackers use a mixed approach (i.e., employing multiple obfuscation techniques simultaneously). Therefore, it is crucial to analyze the impact of the different obfuscation techniques, both when they are used in isolation and when they are combined as hybrid techniques. Several studies have suggested that the obfuscation techniques may be more effective when used in a mixed pattern. However, in most of the related works, the obfuscation techniques used for analysis are either based on individual or a combination of primitive obfuscation techniques. In this work, we provide a comprehensive evaluation of anti-malware tools to gauge the impact of complex hybrid code-obfuscations techniques on malware detection capabilities of the prominent anti-malware tools. The evaluation results show that the inter-category-wise hybridized code obfuscation results in more evasion as compared to the individual or simple hybridized code obfuscations (using multiple and similar code obfuscations) which most of the existing related work employed for the evaluation. Obfuscation techniques significantly impact the detection rate of any anti-malware tool. The remarkable result i.e., almost 100% best detection rate is observed for the seven out of 10 tools when analyzed using the individual obfuscation techniques, four out of 10 tools on category-wise obfuscation, and not a single anti-malware tool attained full detection (i.e., 100%) for inter-category obfuscations. PeerJ Inc. 2022-06-21 /pmc/articles/PMC9299270/ /pubmed/35875645 http://dx.doi.org/10.7717/peerj-cs.1002 Text en © 2022 Nawaz et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Computer Networks and Communications
Nawaz, Umair
Aleem, Muhammad
Lin, Jerry Chun-Wei
On the evaluation of android malware detectors against code-obfuscation techniques
title On the evaluation of android malware detectors against code-obfuscation techniques
title_full On the evaluation of android malware detectors against code-obfuscation techniques
title_fullStr On the evaluation of android malware detectors against code-obfuscation techniques
title_full_unstemmed On the evaluation of android malware detectors against code-obfuscation techniques
title_short On the evaluation of android malware detectors against code-obfuscation techniques
title_sort on the evaluation of android malware detectors against code-obfuscation techniques
topic Computer Networks and Communications
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9299270/
https://www.ncbi.nlm.nih.gov/pubmed/35875645
http://dx.doi.org/10.7717/peerj-cs.1002
work_keys_str_mv AT nawazumair ontheevaluationofandroidmalwaredetectorsagainstcodeobfuscationtechniques
AT aleemmuhammad ontheevaluationofandroidmalwaredetectorsagainstcodeobfuscationtechniques
AT linjerrychunwei ontheevaluationofandroidmalwaredetectorsagainstcodeobfuscationtechniques