SlideShare a Scribd company logo
CATCH ME IF YOU CAN: EVALUATING ANDROID 
ANTI-MALWARE AGAINST TRANSFORMATION 
ATTACKS 
PRESENTED BY: 
LANSA INFORMATICS PVT LTD
ABSTRACT: 
• Mobile malware threats (e.g., on Android) have recently become a real 
concern. In this paper, we evaluate the state-of-the-art commercial 
mobile anti-malware products for Android and test how resistant they 
are against various common obfuscation techniques (even with known 
malware). 
• Such an evaluation is important for not only measuring the available 
defense against mobile malware threats, but also proposing effective, 
next generation solutions. 
• We developed DroidChameleon, a systematic framework with various 
transformation techniques, and used it for our study.
• Our results on 10 popular commercial anti-malware applications for Android are 
worrisome: none of these tools is resistant against common malware 
transformation techniques. 
• In addition, a majority of them can be trivially defeated by applying slight 
transformation over known malware with little effort for malware authors. 
• Finally, in light of our results, we propose possible remedies for improving the 
current state of malware detection on mobile devices.
EXISTING SYSTEM: 
• Mobile computing devices such as smartphones and tablets are becoming increasingly 
popular. 
• Unfortunately, this popularity attracts malware authors too. In reality, mobile malware 
has already become a serious concern. 
• It has been reported that on Android, one of the most popular smartphone platforms, 
malware has constantly been on the rise and the platform is seen as “clearly today’s 
target”. 
• With the growth of malware, the platform has also seen an evolution of anti-malware 
tools, with a range of free and paid offerings now available in the official Android app 
market, Google Play.
• Polymorphic attacks have long been a plague for traditional desktop and server 
systems. While there exist earlier studies the effectiveness of anti-malware tools 
on PCs, our domain of study 
• is different in that we exclusively focus on mobile devices like smartphones, which 
require different ways for anti-malware design. 
• Also, malware on mobile devices have recently escalated their evolution but the 
capabilities of existing anti-malware tools are largely not yet understood.
DISADVANTAGES OF EXISTING SYSTEM: 
Some of the applications even claim resistance 
against malware transformations. 
It will detect only specific malwares. 
It allows application to access and modify all the 
information.
PROBLEM STATEMENT: 
We aim to evaluate the efficacy of anti-malware tools on Android in 
the face of various evasion techniques 
SCOPE: 
Findings show that some antimalware tools have tried to strengthen 
their signatures with a trend towards content-based signatures while 
previously they were evaded by trivial transformations not involving code-level 
changes. The improved signatures are however still shown to be easily 
evaded.
PROPOSED SYSTEM: 
 To evaluate existing anti-malware software, we develop a systematic framework called DroidChameleon with 
several common transformation techniques that may be used to transform Android applications 
automatically. 
 Some of these transformations are highly specific to the Android platform only. 
Based on the framework, we pass known malware samples (from different families) through these 
transformations to generate new variants of malware, which are verified to possess the originals’ malicious 
functionality. 
 We use these variants to evaluate the effectiveness and robustness of popular anti-malware tools. 
 Based on our evaluation results, we also explore possible ways to improve current anti-malware solutions. 
 Specifically, we point out that Android eases developing advanced detection techniques because much code 
is high-level bytecodes rather than native codes. 
 Furthermore, certain platformsupport can be enlisted to cope with advanced transformations.
ADVANTAGES OF PROPOSED SYSTEM: 
It provides solutions for all types of malware available. 
It block the application to access the information. 
Resist to all types of transformations available to harm 
the system.
SYSTEM CONFIGURATION:- 
HARDWARE REQUIREMENTS:- 
Processor - Pentium –IV 
Speed - 1.1 Ghz 
RAM - 512 MB(min) 
Hard Disk - 40 GB 
Key Board - Standard Windows Keyboard 
Mouse - Two or Three Button Mouse 
Monitor - LCD/LED
SYSTEM CONFIGURATION:- 
SOFTWARE REQUIREMENTS:- 
Operating system : Windows XP. 
Coding Language : Android 
Data Base : SQLite 
Tool : Eclipse.
REFERENCE: 
Vaibhav Rastogi, Yan Chen, and Xuxian Jiang “Catch Me If You Can: Evaluating Android 
Anti-Malware Against Transformation Attacks ” IEEE TRANSACTIONS ON 
INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014
OFFICE ADDRESS: 
LansA Informatics Pvt ltd 
No 165, 5th Street, 
Crosscut Road, 
Gandhipuram, 
Coimbatore - 641 015 
OTHER MODE OF CONTACT: 
Landline: 0422 – 4204373 
Mobile : +91 90 953 953 33 
+91 91 591 159 69 
Email ID: lansa.projects@gmail.com 
web: www.lansainformatics.com 
Blog: 
www.lansastudentscdc.blogspot.co 
m 
Facebook: 
www.facebook.com/lansainformati 
cs 
Twitter: 
www.twitter.com/lansainformatic 
CONTACT US

More Related Content

PDF
Most effective QA & testing types
PPTX
Presentation (software engineering)
PPTX
Software security testing
PPTX
Android anti virus analysis
PDF
Penetration testing services
PDF
Mobile Application Security
PDF
Risks in the Software Supply Chain
PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Most effective QA & testing types
Presentation (software engineering)
Software security testing
Android anti virus analysis
Penetration testing services
Mobile Application Security
Risks in the Software Supply Chain
Vulnerability Management Nirvana - Seattle Agora - 18Mar16

What's hot (7)

PDF
The Essentials of Mobile App Testing and Monitoring
PPTX
Fuzzing101: Unknown vulnerability management for Telecommunications
PDF
Mobile Application Testing - White Paper
PDF
Dtl 2012 kl-app_ctl1.2
PPTX
Intelligence on the Intractable Problem of Software Security
PDF
Exploratory testing and the mobile tester : A presentation by Jon Hagar
PPT
Se ii unit1-se_ii_intorduction
The Essentials of Mobile App Testing and Monitoring
Fuzzing101: Unknown vulnerability management for Telecommunications
Mobile Application Testing - White Paper
Dtl 2012 kl-app_ctl1.2
Intelligence on the Intractable Problem of Software Security
Exploratory testing and the mobile tester : A presentation by Jon Hagar
Se ii unit1-se_ii_intorduction
Ad

Viewers also liked (8)

PPTX
The rise of android malware and efficiency of Anti-Virus
PDF
Android OS Security: Risks and Limitations. AISEC Technical Report
PPTX
Accessibility Clickjacking, Devastating Android Vulnerability
PPTX
How to Add Advanced Threat Defense to Your EMM
KEY
Owasp o2 platform november 2010
PDF
Gartner Market Insights- Mobile Threat Defense and EMM
PPTX
LinkedIn powerpoint
PDF
Mobile Is Eating the World (2016)
The rise of android malware and efficiency of Anti-Virus
Android OS Security: Risks and Limitations. AISEC Technical Report
Accessibility Clickjacking, Devastating Android Vulnerability
How to Add Advanced Threat Defense to Your EMM
Owasp o2 platform november 2010
Gartner Market Insights- Mobile Threat Defense and EMM
LinkedIn powerpoint
Mobile Is Eating the World (2016)
Ad

Similar to Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation Attacks (20)

DOCX
Catch me if you can evaluating android anti malware against transformation at...
PDF
Evaluating android antimalware against transformation attacks
DOCX
Review of behavior malware analysis for android
PDF
I haz you and pwn your maal whitepaper
PDF
Avtest 2012 02-android_anti-malware_report_english
PDF
Avtest 2012 02-android_anti-malware_report_english
PDF
Avtest 2012 02-android_anti-malware_report_english
PDF
Avtest 2012 02-android_anti-malware_report_english
PPT
Generating Risk Summary Risk Scores For Mobile Applications
PPTX
A simple guide to software compatibility test services
RTF
Madam synopis
PDF
Choosing Cybersecurity Tools for Your Tech Stack
PPTX
MALWARE DETECTION A FRAMEWORK FOR REVERSE ENGINEERED ANDROID APPLICATIONS_.pptx
PPT
Panda Security2008
PDF
MalPurifier. Детокс вашего андроид устройства по одному вредоносному байту за...
PDF
SentinelOne Buyers Guide
PPTX
5-Dimensions of software (How it works).pptx
PPTX
Malware Improvements in Android OS
PDF
Tech Report: On the Effectiveness of Malware Protection on Android
PDF
Class work 3_computer_network_317
Catch me if you can evaluating android anti malware against transformation at...
Evaluating android antimalware against transformation attacks
Review of behavior malware analysis for android
I haz you and pwn your maal whitepaper
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Generating Risk Summary Risk Scores For Mobile Applications
A simple guide to software compatibility test services
Madam synopis
Choosing Cybersecurity Tools for Your Tech Stack
MALWARE DETECTION A FRAMEWORK FOR REVERSE ENGINEERED ANDROID APPLICATIONS_.pptx
Panda Security2008
MalPurifier. Детокс вашего андроид устройства по одному вредоносному байту за...
SentinelOne Buyers Guide
5-Dimensions of software (How it works).pptx
Malware Improvements in Android OS
Tech Report: On the Effectiveness of Malware Protection on Android
Class work 3_computer_network_317

More from Papitha Velumani (20)

PDF
2015 - 2016 IEEE Project Titles and abstracts in Java
PDF
2015 - 2016 IEEE Project Titles and abstracts in Android
PDF
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
DOC
Trajectory improves data delivery in urban vehicular networks
DOC
Tracon interference aware scheduling for data-intensive applications in virtu...
DOC
Supporting privacy protection in personalized web search
DOC
Stochastic bandwidth estimation in networks with random service
DOC
Sos a distributed mobile q&a system based on social networks
DOC
Security evaluation of pattern classifiers under attack
DOC
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
DOC
Probabilistic consolidation of virtual machines in self organizing cloud data...
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving and content-protecting location based queries
DOC
Pack prediction based cloud bandwidth and cost reduction system
DOC
Occt a one class clustering tree for implementing one-to-man data linkage
DOC
Leveraging social networks for p2p content based file sharing in disconnected...
DOC
LDBP: localized boundary detection and parametrization for 3 d sensor networks
DOC
Integrity for join queries in the cloud
DOC
Improving fairness, efficiency, and stability in http based adaptive video st...
DOC
Hybrid attribute and re-encryption-based key management for secure and scala...
2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
Trajectory improves data delivery in urban vehicular networks
Tracon interference aware scheduling for data-intensive applications in virtu...
Supporting privacy protection in personalized web search
Stochastic bandwidth estimation in networks with random service
Sos a distributed mobile q&a system based on social networks
Security evaluation of pattern classifiers under attack
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Probabilistic consolidation of virtual machines in self organizing cloud data...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving and content-protecting location based queries
Pack prediction based cloud bandwidth and cost reduction system
Occt a one class clustering tree for implementing one-to-man data linkage
Leveraging social networks for p2p content based file sharing in disconnected...
LDBP: localized boundary detection and parametrization for 3 d sensor networks
Integrity for join queries in the cloud
Improving fairness, efficiency, and stability in http based adaptive video st...
Hybrid attribute and re-encryption-based key management for secure and scala...

Recently uploaded (20)

PPTX
master seminar digital applications in india
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
master seminar digital applications in india
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
TR - Agricultural Crops Production NC III.pdf
Cell Structure & Organelles in detailed.
STATICS OF THE RIGID BODIES Hibbelers.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Renaissance Architecture: A Journey from Faith to Humanism
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Pre independence Education in Inndia.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Computing-Curriculum for Schools in Ghana
human mycosis Human fungal infections are called human mycosis..pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Microbial diseases, their pathogenesis and prophylaxis

Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation Attacks

  • 1. CATCH ME IF YOU CAN: EVALUATING ANDROID ANTI-MALWARE AGAINST TRANSFORMATION ATTACKS PRESENTED BY: LANSA INFORMATICS PVT LTD
  • 2. ABSTRACT: • Mobile malware threats (e.g., on Android) have recently become a real concern. In this paper, we evaluate the state-of-the-art commercial mobile anti-malware products for Android and test how resistant they are against various common obfuscation techniques (even with known malware). • Such an evaluation is important for not only measuring the available defense against mobile malware threats, but also proposing effective, next generation solutions. • We developed DroidChameleon, a systematic framework with various transformation techniques, and used it for our study.
  • 3. • Our results on 10 popular commercial anti-malware applications for Android are worrisome: none of these tools is resistant against common malware transformation techniques. • In addition, a majority of them can be trivially defeated by applying slight transformation over known malware with little effort for malware authors. • Finally, in light of our results, we propose possible remedies for improving the current state of malware detection on mobile devices.
  • 4. EXISTING SYSTEM: • Mobile computing devices such as smartphones and tablets are becoming increasingly popular. • Unfortunately, this popularity attracts malware authors too. In reality, mobile malware has already become a serious concern. • It has been reported that on Android, one of the most popular smartphone platforms, malware has constantly been on the rise and the platform is seen as “clearly today’s target”. • With the growth of malware, the platform has also seen an evolution of anti-malware tools, with a range of free and paid offerings now available in the official Android app market, Google Play.
  • 5. • Polymorphic attacks have long been a plague for traditional desktop and server systems. While there exist earlier studies the effectiveness of anti-malware tools on PCs, our domain of study • is different in that we exclusively focus on mobile devices like smartphones, which require different ways for anti-malware design. • Also, malware on mobile devices have recently escalated their evolution but the capabilities of existing anti-malware tools are largely not yet understood.
  • 6. DISADVANTAGES OF EXISTING SYSTEM: Some of the applications even claim resistance against malware transformations. It will detect only specific malwares. It allows application to access and modify all the information.
  • 7. PROBLEM STATEMENT: We aim to evaluate the efficacy of anti-malware tools on Android in the face of various evasion techniques SCOPE: Findings show that some antimalware tools have tried to strengthen their signatures with a trend towards content-based signatures while previously they were evaded by trivial transformations not involving code-level changes. The improved signatures are however still shown to be easily evaded.
  • 8. PROPOSED SYSTEM:  To evaluate existing anti-malware software, we develop a systematic framework called DroidChameleon with several common transformation techniques that may be used to transform Android applications automatically.  Some of these transformations are highly specific to the Android platform only. Based on the framework, we pass known malware samples (from different families) through these transformations to generate new variants of malware, which are verified to possess the originals’ malicious functionality.  We use these variants to evaluate the effectiveness and robustness of popular anti-malware tools.  Based on our evaluation results, we also explore possible ways to improve current anti-malware solutions.  Specifically, we point out that Android eases developing advanced detection techniques because much code is high-level bytecodes rather than native codes.  Furthermore, certain platformsupport can be enlisted to cope with advanced transformations.
  • 9. ADVANTAGES OF PROPOSED SYSTEM: It provides solutions for all types of malware available. It block the application to access the information. Resist to all types of transformations available to harm the system.
  • 10. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:- Processor - Pentium –IV Speed - 1.1 Ghz RAM - 512 MB(min) Hard Disk - 40 GB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - LCD/LED
  • 11. SYSTEM CONFIGURATION:- SOFTWARE REQUIREMENTS:- Operating system : Windows XP. Coding Language : Android Data Base : SQLite Tool : Eclipse.
  • 12. REFERENCE: Vaibhav Rastogi, Yan Chen, and Xuxian Jiang “Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks ” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014
  • 13. OFFICE ADDRESS: LansA Informatics Pvt ltd No 165, 5th Street, Crosscut Road, Gandhipuram, Coimbatore - 641 015 OTHER MODE OF CONTACT: Landline: 0422 – 4204373 Mobile : +91 90 953 953 33 +91 91 591 159 69 Email ID: lansa.projects@gmail.com web: www.lansainformatics.com Blog: www.lansastudentscdc.blogspot.co m Facebook: www.facebook.com/lansainformati cs Twitter: www.twitter.com/lansainformatic CONTACT US