Cybersecurity (Jun 2018)

DroidEcho: an in-depth dissection of malicious behaviors in Android applications

  • Guozhu Meng,
  • Ruitao Feng,
  • Guangdong Bai,
  • Kai Chen,
  • Yang Liu

DOI
https://doi.org/10.1186/s42400-018-0006-7
Journal volume & issue
Vol. 1, no. 1
pp. 1 – 17

Abstract

Read online

Abstract A precise representation for attacks can benefit the detection of malware in both accuracy and efficiency. However, it is still far from expectation to describe attacks precisely on the Android platform. In addition, new features on Android, such as communication mechanisms, introduce new challenges and difficulties for attack detection. In this paper, we propose abstract attack models to precisely capture the semantics of various Android attacks, which include the corresponding targets, involved behaviors as well as their execution dependency. Meanwhile, we construct a novel graph-based model called the inter-component communication graph (ICCG) to describe the internal control flows and inter-component communications of applications. The models take into account more communication channel with a maximized preservation of their program logics. With the guidance of the attack models, we propose a static searching approach to detect attacks hidden in ICCG. To reduce false positive rate, we introduce an additional dynamic confirmation step to check whether the detected attacks are false alarms. Experiments show that DroidEcho can detect attacks in both benchmark and real-world applications effectively and efficiently with a precision of 89.5%.

Keywords