Proceedings of the 8th International Conference on Security of Information and Networks 2015
DOI: 10.1145/2799979.2800004
|View full text |Cite
|
Sign up to set email alerts
|

A robust dynamic analysis system preventing SandBox detection by Android malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“… – Anti-emulation Detection Anti-emulation evasions consist of VMA and PID evasion techniques; the following is the insight of detection framework analysis: – VMA Evasion Detection: As a countermeasure for the VMA evasion technique, researchers ( David & Netanyahu, 2015 ; Mutti et al, 2015 ) equip an emulator sandbox with physical devices to dynamically run the application analyzes. Dietzel (2014) , Gajrani et al (2015) , and Hu & Xiao (2014) propose a fake response agent, which feeds the in the dynamic analysis based testing and a masquerade emulator as a physical device. In late 2015 and the beginning of 2016, several studies analyze the nature of anti-emulation malware with false values about the environment request.…”
Section: Evaluation Of Evasion Detection Frameworkmentioning
confidence: 99%
“… – Anti-emulation Detection Anti-emulation evasions consist of VMA and PID evasion techniques; the following is the insight of detection framework analysis: – VMA Evasion Detection: As a countermeasure for the VMA evasion technique, researchers ( David & Netanyahu, 2015 ; Mutti et al, 2015 ) equip an emulator sandbox with physical devices to dynamically run the application analyzes. Dietzel (2014) , Gajrani et al (2015) , and Hu & Xiao (2014) propose a fake response agent, which feeds the in the dynamic analysis based testing and a masquerade emulator as a physical device. In late 2015 and the beginning of 2016, several studies analyze the nature of anti-emulation malware with false values about the environment request.…”
Section: Evaluation Of Evasion Detection Frameworkmentioning
confidence: 99%
“…Hardened sandboxes are ones that are not so easily bypassed. Gajrani et al [11] took this threat into account, and set out to develop techniques that help malware analysts build a hardened sandbox analysis environment by identifying commonly used sandbox detecting techniques and patching them by applying emulator modifications, system image modifications, and by applying runtime hooks. Another sandbox hardening approach involves the use of bare-metal devices which drops the need of emulation altogether.…”
Section: Sandbox Hardeningmentioning
confidence: 99%
“…Sandbox hardening can be applied to different components of a sandbox. One approach involves the modification of emulator properties [11]. Certain properties are easy to modify, however others are not modifiable out of the box and require hardware emulation tweaking.…”
Section: Sandbox Hardeningmentioning
confidence: 99%
“…This enables the possibility of hooking method calls and injecting custom code to manipulate the application's behaviors. For instance, Gajrani et al [18] use this framework to hide their emulator from being detected by advanced malware. ARTDroid [19] is another work targeting ART Runtime that enables sandbox to analyze apps without being evaded.…”
Section: Android Hookingmentioning
confidence: 99%