SlideShare a Scribd company logo
ALTERDROID: Differential Fault Analysis of Obfuscated
Smartphone Malware
Abstract
Malware for smartphones has rocketed over the last years. Market operators face
the challenge of keeping their stores free from malicious apps, a task that has
become increasingly complex as malware developers are progressively using
advanced techniques to defeat malware detection tools. One such technique
commonly observed in recent malware samples consists of hiding and obfuscating
modules containing malicious functionality in places that static analysis tools
overlook (e.g., within data objects). In this paper, we describe ALTERDROID, a
dynamic analysis approach for detecting such hidden or obfuscated malware
components distributed as parts of an app package. The key idea in ALTERDROID
consists of analyzing the behavioral differences between the original app and a
number of automatically generated versions of it, where a number of modifications
(faults) have been carefully injected. Observable differences in terms of activities
that appear or vanish in the modified app are recorded, and the resulting
differential signature is analyzed through a pattern-matching process driven by
rules that relate different types of hidden functionalities with patterns found in the
signature. A thorough justification and a description of the proposed model are
provided. The extensive experimental results obtained by testing ALTERDROID over
relevant apps and malware samples support the quality and viability of our
proposal
Existing system
Smartphones present a number of security and privacy concerns that are, in many
respects, even more alarming than those existing in traditional computing
environments. Most smart phone platforms are equipped with multiple sensors
that can determine user location, gestures, moves and other physical activities, to
name a few. Smartphones also feature high-quality audio and video recording
capabilities. Sensitive pieces of information that can be captured by these devices
could be easily leaked by malware residing on the smartphone. Even apparently
harmless capabilities have swiftly turned into a potential menace.
Proposed system
In this paper we describe ALTERDROID, a tool for detecting, through reverse
engineering, obfuscated functionality in components distributed as parts of an app
package. Such components are often part of a malicious app and are hidden outside
its main code components (e.g. within data objects), as code components may be
subject to static analysis by market operators. The key idea in ALTERDROID consists
of analyzing the behavioral differences between the original app and an altered
version where a number of modifications (faults) have been carefully introduced.
Such modifications are designed to have no observable effect on the app execution,
provided that the altered component is actually what it should be (i.e., it does not
hide any unwanted functionality). For example, replacing the value of some pixels
in a picture or a few characters in a string encoding an error message should not
affect the execution. However, if after doing so it is observed that a dynamic class
loading action crashes or a network connection does not take place, it may well be
that the picture was actually a piece of code or the string a network address or a
URL.

More Related Content

PDF
Evaluating android antimalware against transformation attacks
PPTX
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
PDF
Malware Bytes – Advanced Fault Analysis
PDF
20120140504023
PDF
Android Malware Detection Literature Review
PDF
Irjet v7 i3811
PDF
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...
PDF
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
Evaluating android antimalware against transformation attacks
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Malware Bytes – Advanced Fault Analysis
20120140504023
Android Malware Detection Literature Review
Irjet v7 i3811
MOST VIEWED ARTICLES IN ACADEMIA - INTERNATIONAL JOURNAL OF MOBILE NETWORK CO...
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT

Similar to ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware (20)

PDF
A Systematic Review of Android Malware Detection Techniques
PDF
IRJET - System to Identify and Define Security Threats to the users About The...
PDF
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
PDF
Enter Sandbox: Android Sandbox Comparison
PDF
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
PDF
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
PDF
Towards the methods of analysis malicious applications for Android
DOCX
Catch me if you can evaluating android anti malware against transformation at...
PPTX
MALWARE DETECTION A FRAMEWORK FOR REVERSE ENGINEERED ANDROID APPLICATIONS_.pptx
PDF
Survey on Fraud Malware Detection in Google Play Store
PDF
IRJET- Android Malware Detection System
PDF
Android Malware Detection in Official and Third Party Application Stores
PDF
Androinspector a system for
PDF
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
PDF
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
DOCX
Review of behavior malware analysis for android
PDF
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
PPTX
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
PDF
Review on mobile threats and detection techniques
PPTX
Malware Improvements in Android OS
A Systematic Review of Android Malware Detection Techniques
IRJET - System to Identify and Define Security Threats to the users About The...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Enter Sandbox: Android Sandbox Comparison
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
Towards the methods of analysis malicious applications for Android
Catch me if you can evaluating android anti malware against transformation at...
MALWARE DETECTION A FRAMEWORK FOR REVERSE ENGINEERED ANDROID APPLICATIONS_.pptx
Survey on Fraud Malware Detection in Google Play Store
IRJET- Android Malware Detection System
Android Malware Detection in Official and Third Party Application Stores
Androinspector a system for
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Review of behavior malware analysis for android
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
Review on mobile threats and detection techniques
Malware Improvements in Android OS
Ad

More from muhammed jassim k (20)

PDF
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
PDF
Image Cryptography using Nearest Prime Pixels
PDF
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
PDF
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
PDF
4.weather based smart watering system using soil sensor and gsm
PDF
26. qo s ranking prediction for cloud services
PDF
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
PDF
Fire col a collaborative protection
PDF
privacy preserving abstract
PDF
Datamining with big data
PDF
33. dynamic resource allocation using virtual machines
PDF
An automated dynamic offset for network selection in heterogeneous networks
PDF
A location-and Diversity aware News feed system for mobile user
PDF
A feature-Enriched Completely Blind image Quality Evaluator
PDF
PDF
Hierarchical supervisory control system for pe vs participating in frequency ...
PDF
On demand retrieval of crowdsourced
PDF
Medical warehouse business distribution
PDF
Discoveringlatentsemanticsinweb 160617093617
PDF
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
Image Cryptography using Nearest Prime Pixels
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
4.weather based smart watering system using soil sensor and gsm
26. qo s ranking prediction for cloud services
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
Fire col a collaborative protection
privacy preserving abstract
Datamining with big data
33. dynamic resource allocation using virtual machines
An automated dynamic offset for network selection in heterogeneous networks
A location-and Diversity aware News feed system for mobile user
A feature-Enriched Completely Blind image Quality Evaluator
Hierarchical supervisory control system for pe vs participating in frequency ...
On demand retrieval of crowdsourced
Medical warehouse business distribution
Discoveringlatentsemanticsinweb 160617093617
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Ad

Recently uploaded (20)

PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Classroom Observation Tools for Teachers
PDF
01-Introduction-to-Information-Management.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Complications of Minimal Access Surgery at WLH
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Trump Administration's workforce development strategy
Module 4: Burden of Disease Tutorial Slides S2 2025
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Abdominal Access Techniques with Prof. Dr. R K Mishra
Chinmaya Tiranga quiz Grand Finale.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Classroom Observation Tools for Teachers
01-Introduction-to-Information-Management.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
VCE English Exam - Section C Student Revision Booklet
Microbial diseases, their pathogenesis and prophylaxis
O7-L3 Supply Chain Operations - ICLT Program
Complications of Minimal Access Surgery at WLH
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Weekly quiz Compilation Jan -July 25.pdf
Trump Administration's workforce development strategy

ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware

  • 1. ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware Abstract Malware for smartphones has rocketed over the last years. Market operators face the challenge of keeping their stores free from malicious apps, a task that has become increasingly complex as malware developers are progressively using advanced techniques to defeat malware detection tools. One such technique commonly observed in recent malware samples consists of hiding and obfuscating modules containing malicious functionality in places that static analysis tools overlook (e.g., within data objects). In this paper, we describe ALTERDROID, a dynamic analysis approach for detecting such hidden or obfuscated malware components distributed as parts of an app package. The key idea in ALTERDROID consists of analyzing the behavioral differences between the original app and a number of automatically generated versions of it, where a number of modifications (faults) have been carefully injected. Observable differences in terms of activities that appear or vanish in the modified app are recorded, and the resulting differential signature is analyzed through a pattern-matching process driven by rules that relate different types of hidden functionalities with patterns found in the signature. A thorough justification and a description of the proposed model are provided. The extensive experimental results obtained by testing ALTERDROID over relevant apps and malware samples support the quality and viability of our proposal Existing system Smartphones present a number of security and privacy concerns that are, in many respects, even more alarming than those existing in traditional computing environments. Most smart phone platforms are equipped with multiple sensors that can determine user location, gestures, moves and other physical activities, to name a few. Smartphones also feature high-quality audio and video recording
  • 2. capabilities. Sensitive pieces of information that can be captured by these devices could be easily leaked by malware residing on the smartphone. Even apparently harmless capabilities have swiftly turned into a potential menace. Proposed system In this paper we describe ALTERDROID, a tool for detecting, through reverse engineering, obfuscated functionality in components distributed as parts of an app package. Such components are often part of a malicious app and are hidden outside its main code components (e.g. within data objects), as code components may be subject to static analysis by market operators. The key idea in ALTERDROID consists of analyzing the behavioral differences between the original app and an altered version where a number of modifications (faults) have been carefully introduced. Such modifications are designed to have no observable effect on the app execution, provided that the altered component is actually what it should be (i.e., it does not hide any unwanted functionality). For example, replacing the value of some pixels in a picture or a few characters in a string encoding an error message should not affect the execution. However, if after doing so it is observed that a dynamic class loading action crashes or a network connection does not take place, it may well be that the picture was actually a piece of code or the string a network address or a URL.