Javascript must be enabled to continue!
The Dark Side of Native Code on Android
View through CrossRef
<p>From a little research experiment to an essential component of military arsenals, malicious software has constantly been growing and evolving for more than three decades. On the other hand, from a negligible market share, the Android operating system is nowadays the most widely used mobile operating system, becoming a desirable target for large-scale malware distribution. While scientific literature has followed this trend, one aspect has been understudied: the role of native code in malicious Android apps. Android apps are written in high-level languages, but thanks to the Java Native Interface (JNI), Android also supports calling native (C/C++) library functions. While allowing native code in Android apps has a strong positive impact from a performance perspective, it dramatically complicates its analysis because bytecode and native code need different abstractions and analysis algorithms, and they thus pose different challenges and limitations. Consequently, these difficulties are often (ab)used to hide malicious payloads. In this work, we propose a novel methodology to reverse engineering Android apps focusing on suspicious patterns related to native components, i.e., surreptitious code that requires further inspection. We implemented a static analysis tool based on such methodology, which can bridge the “Java” and the native worlds and perform an in-depth analysis of tag code blocks responsible for suspicious behavior. These tags benefit the human facing the reverse engineering task: they clearly indicate which part of the code to focus on to find malicious code. Then, we performed a longitudinal analysis of Android malware over the past ten years and compared the recent malicious samples with actual top apps on the Google Play Store. Our work depicts typical behaviors of modern malware, its evolution, and how it abuses the native layer to complicate the analysis, especially with dynamic code loading and novel anti-analysis techniques. Finally, we show a use case for our suspicious tags: we trained and tested a machine learning algorithm for a binary classification task. Even if suspicious does not imply malicious, our classifier obtained a remarkable F1-score of 0.97, showing that our methodology can be helpful to both humans and machines.</p>
Institute of Electrical and Electronics Engineers (IEEE)
Title: The Dark Side of Native Code on Android
Description:
<p>From a little research experiment to an essential component of military arsenals, malicious software has constantly been growing and evolving for more than three decades.
On the other hand, from a negligible market share, the Android operating system is nowadays the most widely used mobile operating system, becoming a desirable target for large-scale malware distribution.
While scientific literature has followed this trend, one aspect has been understudied: the role of native code in malicious Android apps.
Android apps are written in high-level languages, but thanks to the Java Native Interface (JNI), Android also supports calling native (C/C++) library functions.
While allowing native code in Android apps has a strong positive impact from a performance perspective, it dramatically complicates its analysis because bytecode and native code need different abstractions and analysis algorithms, and they thus pose different challenges and limitations.
Consequently, these difficulties are often (ab)used to hide malicious payloads.
In this work, we propose a novel methodology to reverse engineering Android apps focusing on suspicious patterns related to native components, i.
e.
, surreptitious code that requires further inspection.
We implemented a static analysis tool based on such methodology, which can bridge the “Java” and the native worlds and perform an in-depth analysis of tag code blocks responsible for suspicious behavior.
These tags benefit the human facing the reverse engineering task: they clearly indicate which part of the code to focus on to find malicious code.
Then, we performed a longitudinal analysis of Android malware over the past ten years and compared the recent malicious samples with actual top apps on the Google Play Store.
Our work depicts typical behaviors of modern malware, its evolution, and how it abuses the native layer to complicate the analysis, especially with dynamic code loading and novel anti-analysis techniques.
Finally, we show a use case for our suspicious tags: we trained and tested a machine learning algorithm for a binary classification task.
Even if suspicious does not imply malicious, our classifier obtained a remarkable F1-score of 0.
97, showing that our methodology can be helpful to both humans and machines.
</p>.
Related Results
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
The pandemic Covid-19 currently demands teachers to be able to use technology in teaching and learning process. But in reality there are still many teachers who have not been able ...
Impacts of man-made structures on marine biodiversity and species status - native & non-native species
Impacts of man-made structures on marine biodiversity and species status - native & non-native species
<p>Coastal environments are exposed to anthropogenic activities such as frequent marine traffic and restructuring, i.e., addition, removal or replacing with man-made structur...
CONCEPT TO COMPLETION - ANDROID APPS AND KOTLIN MULTI PLATFORM
CONCEPT TO COMPLETION - ANDROID APPS AND KOTLIN MULTI PLATFORM
“Concept to Completion: Android Apps and Kotlin Multiplatform” is a comprehensive guide designed to take you from the fundamentals of Android development to advanced multiplatform ...
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
<p><code>Intelligent reflecting surface (IRS) is a promising concept for </code><code><u>6G</u></code><code> wireless communications...
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
<p><code>Intelligent reflecting surface (IRS) is a promising concept for </code><code><u>6G</u></code><code> wireless communications...
KONTESTASI TASAWUF SUNNÎ DAN TASAWUF FALSAFÎ DI NUSANTARA
KONTESTASI TASAWUF SUNNÎ DAN TASAWUF FALSAFÎ DI NUSANTARA
<p>This article scrutinizes the history of Islamic development in Nusantara between 15th to 18th centuries, which has been colored from theological mysticism thought. Uniquel...
Dark diversity at home describes the success of cross‐continent tree invasions
Dark diversity at home describes the success of cross‐continent tree invasions
AbstractAimNon‐native species threaten ecosystems worldwide, but we poorly know why some species invade more. Functional traits, residence time and native range size have been ofte...
Pengembangan Modul Berbasis Android tentang Kesiapan Kerja
Pengembangan Modul Berbasis Android tentang Kesiapan Kerja
Tujuan penelitian ini adalah menguji coba seberapa efektifitasnya modul berbasis android tentang kesiapan kerja untuk siswa sekolah kejuruan. Metode kajian menggunakan 4-D Â (Defin...

