4 research outputs found
An analysis of android malware classification services
The increasing number of Android malware forced antivirus (AV) companies to rely on automated classification techniques to determine the family and class of suspicious samples. The research community relies heavily on such labels to carry out prevalence studies of the threat ecosystem and to build datasets that are used to validate and benchmark novel detection and classification methods. In this work, we carry out an extensive study of the Android malware ecosystem by surveying white papers and reports from 6 key players in the industry, as well as 81 papers from 8 top security conferences, to understand how malware datasets are used by both. We, then, explore the limitations associated with the use of available malware classification services, namely VirusTotal (VT) engines, for determining the family of an Android sample. Using a dataset of 2.47 M Android malware samples, we find that the detection coverage of VT's AVs is generally very low, that the percentage of samples flagged by any 2 AV engines does not go beyond 52%, and that common families between any pair of AV engines is at best 29%. We rely on clustering to determine the extent to which different AV engine pairs agree upon which samples belong to the same family (regardless of the actual family name) and find that there are discrepancies that can introduce noise in automatic label unification schemes. We also observe the usage of generic labels and inconsistencies within the labels of top AV engines, suggesting that their efforts are directed towards accurate detection rather than classification. Our results contribute to a better understanding of the limitations of using Android malware family labels as supplied by common AV engines.This work has been supported by the “Ramon y Cajal” Fellowship RYC-2020-029401
Dissecting Android Cryptocurrency Miners
Cryptojacking applications pose a serious threat to mobile devices.
Due to the extensive computations, they deplete the battery fast
and can even damage the device. In this work we make a step
towards combating this threat. We collected and manually verified
a large dataset of Android mining apps. In this paper, we analyze
the gathered miners and identify how they work, what are the most
popular libraries and APIs used to facilitate their development,
and what static features are typical for this class of applications.
Further, we analyzed our dataset using VirusTotal. The majority
of our samples is considered malicious by at least one VirusTotal
scanner, but 16 apps are not detected by any engine; and at least 5
apks were not seen previously by the service.
Mining code could be obfuscated or fetched at runtime, and there
are many confusing miner-related apps that actually do not mine.
Thus, static features alone are not sufficient for miner detection.We
have collected a feature set of dynamic metrics both for miners and
unrelated benign apps, and built a machine learning-based tool for
dynamic detection. Our BrenntDroid tool is able to detect miners
with 95% of accuracy on our dataset
Dissecting Android Cryptocurrency Miners
Cryptojacking applications pose a serious threat to mobile devices.
Due to the extensive computations, they deplete the battery fast
and can even damage the device. In this work we make a step
towards combating this threat. We collected and manually verified
a large dataset of Android mining apps. In this paper, we analyze
the gathered miners and identify how they work, what are the most
popular libraries and APIs used to facilitate their development,
and what static features are typical for this class of applications.
Further, we analyzed our dataset using VirusTotal. The majority
of our samples is considered malicious by at least one VirusTotal
scanner, but 16 apps are not detected by any engine; and at least 5
apks were not seen previously by the service.
Mining code could be obfuscated or fetched at runtime, and there
are many confusing miner-related apps that actually do not mine.
Thus, static features alone are not sufficient for miner detection.We
have collected a feature set of dynamic metrics both for miners and
unrelated benign apps, and built a machine learning-based tool for
dynamic detection. Our BrenntDroid tool is able to detect miners
with 95% of accuracy on our dataset