Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones &Amp; Mobile Devices 2013
DOI: 10.1145/2516760.2516769
|View full text |Cite
|
Sign up to set email alerts
|

Sound and precise malware analysis for android via pushdown reachability and entry-point saturation

Abstract: Sound malware analysis of Android applications is challenging. First, object-oriented programs exhibit highly interprocedural, dynamically dispatched control structure. Second, the Android programming paradigm relies heavily on the asynchronous execution of multiple entry points. Existing analysis techniques focus more on the second challenge, while relying on traditional analytic techniques that suffer from inherent imprecision or unsoundness to solve the first.We present Anadroid, a static malware analysis f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(22 citation statements)
references
References 30 publications
0
22
0
Order By: Relevance
“…C o n te x t-S e n si ti v e F lo w -S e n si ti v e F ie ld -S e n si ti v e O b je c t-S e n si ti v e P a th -S e n si ti v e Anadroid [36] 3 3 3 7 3 Total 30 31 36 15 5 In theory, the more sensitivities considered, the more precise the analysis is. It is thus reasonable to state that only one approach, namely TRESHER [106], achieves high precision by taking into account all sensitivities.…”
Section: Toolmentioning
confidence: 99%
“…C o n te x t-S e n si ti v e F lo w -S e n si ti v e F ie ld -S e n si ti v e O b je c t-S e n si ti v e P a th -S e n si ti v e Anadroid [36] 3 3 3 7 3 Total 30 31 36 15 5 In theory, the more sensitivities considered, the more precise the analysis is. It is thus reasonable to state that only one approach, namely TRESHER [106], achieves high precision by taking into account all sensitivities.…”
Section: Toolmentioning
confidence: 99%
“…The bot samples in our experiment use network connectivity as their main communication means. However, some of them use SMS, not as the main communication means, but just to intercept incoming messages and leak their content to attackers via network traffic (Liang et al 2013;Seo et al 2013).…”
Section: Malicious Applicationsmentioning
confidence: 99%
“…It is an effective semantic-based abstract interpretation framework to detect maliciousness in Android applications [15]. However, the analysis still suffers from the performance bottleneck originating from the subsumption testing during fixed point computation.…”
Section: Application: Pushdown Control Flow Analysis For Objectmentioning
confidence: 99%
“…The details of this analyzer can be found in [15]. It is the same analyzer we have used in the later evaluation section VIII.…”
Section: Introductionmentioning
confidence: 99%