SlideShare a Scribd company logo
Catch Me If You Can: Evaluating Android Anti-Malware 
Against Transformation Attacks 
ABSTRACT: 
Mobile malware threats (e.g., on Android) have recently become a real concern. In 
this paper, we evaluate the state-of-the-art commercial mobile anti-malware 
products for Android and test how resistant they are against various common 
obfuscation techniques (even with known malware). Such an evaluation is 
important for not only measuring the available defense against mobile malware 
threats, but also proposing effective, next-generation solutions. We developed 
DroidChameleon, a systematic framework with various transformation techniques, 
and used it for our study. Our results on 10 popular commercial anti-malware 
applications for Android are worrisome: none of these tools is resistant against 
common malware transformation techniques. In addition, a majority of them can 
be trivially defeated by applying slight transformation over known malware with 
little effort for malware authors. Finally, in light of our results, we propose 
possible remedies for improving the current state of malware detection on mobile 
devices.
EXISTING SYSTEM: 
Existing anti-malware software, studied the robustness of anti-malware against 
Android malware recently using a tool called ADAM. ADAM implements only a 
few transformations, renaming methods, introducing junk methods, code 
reordering, and string encoding, in addition to repacking and 
assembling/disassembling. 
DISADVANTAGES OF EXISTING SYSTEM: 
ADAM implements only a few transformations, renaming methods, introducing 
junk methods, code reordering, and string encoding, in addition to repacking and 
assembling/disassembling. 
ADAM is not always able to evade an anti-malware tool. 
Obfuscation resilient detection is based on semantics rather than syntac.
PROPOSED SYSTEM: 
In this paper, we aim to evaluate the efficacy of anti-malware tools on Android in 
the face of various evasion techniques. For example, polymorphism is used to 
evade detection tools by transforming a malware in different forms (“morphs”) but 
with the same code. Metamorphism is another common technique that can mutate 
code so that it no longer remains the same but still has the same behaviour. For 
ease of presentation, we use the term polymorphism in this paper to represent both 
obfuscation techniques. In addition, we use the term ‘transformation’ broadly, to 
refer to various polymorphic or metamorphic changes. 
ADVANTAGES OF PROPOSED SYSTEM: 
Our set of transformations is much more comprehensive and includes renaming 
packages, classes, encoding array data, inserting junk statements, encrypting 
payloads and native exploits, reflection, and bytecode encryption as well. 
Our framework is comprehensive, aimed towards complete evasion of all anti-malware 
tools. We believe our results make a clear statement – all anti-malware 
tools can be evaded using common obfuscation techniques. Unlike ADAM, our 
result is able to highlight the severity of the problem and is easily accessible.
Many works have been done towards discovery and characterization of smartphone 
malware. Our work is distinct from these as we try to evaluate the efficacy of 
existing tools against transformed malware. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
 MOBILE : ANDROID 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : Java 1.7
 Tool Kit : Android 2.3 ABOVE 
 IDE : Eclipse 
REFERENCE: 
Vaibhav Rastogi, Yan Chen, and Xuxian Jiang, “Catch Me If You Can: Evaluating 
Android Anti-Malware Against Transformation Attacks”-IEEE 
TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 
VOL. 9, NO. 1, JANUARY 2014.

More Related Content

PPTX
Mood board
PPTX
ค่าเฉลี่ยเลขคณิต
PPTX
Entr project
PPTX
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
DOCX
Delta++ reducing the size of android application updates
DOCX
Sbd 4 and sbd 9 legal aid
PPTX
This is a test
Mood board
ค่าเฉลี่ยเลขคณิต
Entr project
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Delta++ reducing the size of android application updates
Sbd 4 and sbd 9 legal aid
This is a test

Viewers also liked (8)

PPTX
Photoshop Power Point! By Kainaz
PPTX
ค่าเฉลี่ยเลขคณิต บุ๋ม 1
PPTX
Turing Talk Slides
PPTX
Complex Network Analysis
PPT
Cultural differences us situations
PPT
Prefix suffix
PPTX
Internal control assessment
DOCX
Initial planning
Photoshop Power Point! By Kainaz
ค่าเฉลี่ยเลขคณิต บุ๋ม 1
Turing Talk Slides
Complex Network Analysis
Cultural differences us situations
Prefix suffix
Internal control assessment
Initial planning
Ad

Similar to Catch me if you can evaluating android anti malware against transformation attacks (20)

PPTX
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
PDF
Evaluating android antimalware against transformation attacks
DOCX
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
RTF
Madam synopis
PDF
SentinelOne Buyers Guide
PDF
Next Generation Endpoint Prtection Buyers Guide
PPTX
Droidcon mobile security
PPTX
Android anti virus analysis
PDF
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
PDF
DEFCON 21: EDS: Exploitation Detection System WP
PDF
Avtest 2012 02-android_anti-malware_report_english
PDF
WHAT IS APP SECURITY – THE COMPLETE PROCESS AND THE TOOLS & TESTS TO RUN IT
DOCX
Poly-meta-morphic malware looks different each time it is stored on di.docx
DOCX
Review of behavior malware analysis for android
PDF
A case study of malware detection and removal in android apps
PDF
Avtest 2012 02-android_anti-malware_report_english
PDF
Avtest 2012 02-android_anti-malware_report_english
PDF
Avtest 2012 02-android_anti-malware_report_english
PPTX
Malware 101 by saurabh chaudhary
PDF
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
Evaluating android antimalware against transformation attacks
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Madam synopis
SentinelOne Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
Droidcon mobile security
Android anti virus analysis
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
DEFCON 21: EDS: Exploitation Detection System WP
Avtest 2012 02-android_anti-malware_report_english
WHAT IS APP SECURITY – THE COMPLETE PROCESS AND THE TOOLS & TESTS TO RUN IT
Poly-meta-morphic malware looks different each time it is stored on di.docx
Review of behavior malware analysis for android
A case study of malware detection and removal in android apps
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Malware 101 by saurabh chaudhary
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
Ad

Catch me if you can evaluating android anti malware against transformation attacks

  • 1. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks ABSTRACT: Mobile malware threats (e.g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). Such an evaluation is important for not only measuring the available defense against mobile malware threats, but also proposing effective, next-generation solutions. We developed DroidChameleon, a systematic framework with various transformation techniques, and used it for our study. Our results on 10 popular commercial anti-malware applications for Android are worrisome: none of these tools is resistant against common malware transformation techniques. In addition, a majority of them can be trivially defeated by applying slight transformation over known malware with little effort for malware authors. Finally, in light of our results, we propose possible remedies for improving the current state of malware detection on mobile devices.
  • 2. EXISTING SYSTEM: Existing anti-malware software, studied the robustness of anti-malware against Android malware recently using a tool called ADAM. ADAM implements only a few transformations, renaming methods, introducing junk methods, code reordering, and string encoding, in addition to repacking and assembling/disassembling. DISADVANTAGES OF EXISTING SYSTEM: ADAM implements only a few transformations, renaming methods, introducing junk methods, code reordering, and string encoding, in addition to repacking and assembling/disassembling. ADAM is not always able to evade an anti-malware tool. Obfuscation resilient detection is based on semantics rather than syntac.
  • 3. PROPOSED SYSTEM: In this paper, we aim to evaluate the efficacy of anti-malware tools on Android in the face of various evasion techniques. For example, polymorphism is used to evade detection tools by transforming a malware in different forms (“morphs”) but with the same code. Metamorphism is another common technique that can mutate code so that it no longer remains the same but still has the same behaviour. For ease of presentation, we use the term polymorphism in this paper to represent both obfuscation techniques. In addition, we use the term ‘transformation’ broadly, to refer to various polymorphic or metamorphic changes. ADVANTAGES OF PROPOSED SYSTEM: Our set of transformations is much more comprehensive and includes renaming packages, classes, encoding array data, inserting junk statements, encrypting payloads and native exploits, reflection, and bytecode encryption as well. Our framework is comprehensive, aimed towards complete evasion of all anti-malware tools. We believe our results make a clear statement – all anti-malware tools can be evaded using common obfuscation techniques. Unlike ADAM, our result is able to highlight the severity of the problem and is easily accessible.
  • 4. Many works have been done towards discovery and characterization of smartphone malware. Our work is distinct from these as we try to evaluate the efficacy of existing tools against transformed malware. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.  MOBILE : ANDROID SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : Java 1.7
  • 5.  Tool Kit : Android 2.3 ABOVE  IDE : Eclipse REFERENCE: Vaibhav Rastogi, Yan Chen, and Xuxian Jiang, “Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks”-IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014.