SlideShare a Scribd company logo
MINING APPS FOR ABNORMAL USAGE OF SENSITIVE DATA
By Anik Ralhan(Paper 8 – Security)
Course Name: SENG 607 L01 - Special
Topics in Software Engineering
Supervisor: Prof. Hadi Hemmati
1
Plan
Authors
Task
Technique
Motivation –an example
Method
Data set
Related work
Critique
Extension
2
Authors
PhD student, Since summer
2014 I'm working as a
research assistant at
Software Engineering chair
Saarland University
Vitalii Avdiienko Konstantin Kuznetsov
PhD student in the
Software
Engineering Chair
at Saarland
University
Alessandra Gorla
Assistant researcher
professor at
the IMDEA Software
Institute in Madrid,
Spain.
3
Authors
Contd.
Andreas Zeller
Full professor for Software Engineering at Saarland University in Germany
4
Authors
Contd.
Head of Department
Secure Software
Engineering at Fraunhofer
SIT
Steven Arzt Siegfried Rasthofer
Researcher,
Fraunhofer
Institute for
Secure
Information
Technology
Head of program
committee of ACM
International
Symposium on
Engineering Secure
Software and
Systems (ESSoS)
Prof. Dr. Eric Bodden
5
Task
Detect whether a mobile application behaves as expected is a prominent
problem for users.
6
Technique
7
Technique
Contd.
Triage: Depending on workload, analysis what, how and fix.
Static: Like reading a map for directions on where to go.
Dynamic: deeper analysis of the program to understand hidden
functionality.
8
Technique:
MUDFLOW
Not just a pattern match.
Trained with flow of data in benign apps.
compares behavior of mined large set of benign apps.
If abnormal, it declares as
Malicious!!!!!!!!!
9
Motivation
10
Motivation
Contd.
11
Motivation
Contd.
12
Method
13
Method
Contd.
Flowdroid: The static taint analysis tool with 86% precise & 93% recall
on DroidBench
Analysis is based on Soot, Heros and SuSi.
Necessary meta information are extracted from Android’s
manifest file, dex files and layout xml files.
Step 1
14
Method
Contd.
15
Method
Contd.
16
Method
Contd.
java -Xmx4g -cp soot-trunk.jar;soot-infoflow.jar;soot-infoflow-
android.jar;slf4j-api-1.7.5.jar;slf4j-simple-1.7.5.jar;axml-2.0.jar
soot.jimple.infoflow.android.TestApps.Test "InsecureBank.apk"
C:UsersanikDownloadssdkplatforms
Heap size dependencies
Input file
17
Method
Contd.
Call graph
18
Method
Contd.
No. of source & sinks
Sink from source connection
Performance analysis
19
Method
Contd.
Automatic classification using ORCA method. Bay & Schwabacher
introduced this technique in 2003 in their research paper.
Step 2 & 3
20
Data
The initial test was conducted in March 2014 on 2950 apps from 30
app category. 2866 apps they could test.
Benign
25,577 apps selected from VirusShare and Genom malware projects .
15,338 apps were actually test.
Malicious
21
Data
Contd.
Ignored Log & Intent.
Network & SMS_MMS sinks.
False positives were almost 18.7 % while recognizing false positives.
Outlier score in individual categories are good indicators of malicious
behavior.
22
Related
Work
Hp Fortify - different kinds of findings
Data flows from sensitive sources to public sinks
Requests for security-sensitive permissions.
Calls to security-sensitive methods.
LeakMiner – appears similar to Mudflow
an app can be analyzed in 2.5 minutes on average.
23
Critique
FlowDroid performance tuning technique is not used to fix 16
apps RAM size issue.
24
Extension
Optimize analysis so that apps of varied sizes can be analyzed.1
Provide results in comparison commercial tools available in market like
we discussed and conduct a survey with industry experts.
2
25
Summary
Researchers of paper
Task – Android apk malware analysis
Technique – Reverse Engineering of .apk file
Triage, Static and Dynamic Analysis
Mudflow
Motivation – Local Restaurant example
Method – Static analysis tools
Step1 FlowDroid
Step2 ORCA method
Step3 Aggregate step 2 scores
Data set – Benign 2866
Malicious 15338
Related work – Commercial tool HP fortify, IBM AppScan
LeakMiner
Critique – FlowDroid performance tuning
Extension – Optimization, Survey with experts
26

More Related Content

PPTX
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
PDF
Knowledge and Data Engineering IEEE 2015 Projects
PDF
Zero day malware detection
PPT
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
PDF
178 - A replicated study on duplicate detection: Using Apache Lucene to searc...
PDF
Knowledge and Data Engineering IEEE 2015 Projects
PDF
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
PDF
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Knowledge and Data Engineering IEEE 2015 Projects
Zero day malware detection
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
178 - A replicated study on duplicate detection: Using Apache Lucene to searc...
Knowledge and Data Engineering IEEE 2015 Projects
Analysis of Malware Infected Systems & Classification with Gradient-boosted T...
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 

What's hot (20)

PDF
Survey on Fraud Malware Detection in Google Play Store
PPTX
Lie detector
PDF
IRJET- Plagiarism Checker
PDF
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
PDF
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
PPTX
A Behavior-based Approach to Secure and Resilient Industrial Control Systems
PDF
IRJET- Android Malware Detection using Deep Learning
PDF
Penetration testing services
PPTX
Predicting Defects Using Change Genealogies (ISSE 2013)
PPTX
Advantages of a Paperless Laboratory with an ELN
PDF
Nonadaptive mastermind algorithms for string and vector databases, with case ...
PDF
A Survey on Bug Tracking System for Effective Bug Clearance
PDF
abstract
PDF
Syndromic surveillance - Health Analytics on Social Media
PDF
resume_cs
PPTX
Evaluating the possibility of integrating augmented reality and internet of t...
DOCX
Res_010717
PDF
TriggerScope: Towards Detecting Logic Bombs in Android Applications
PDF
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Survey on Fraud Malware Detection in Google Play Store
Lie detector
IRJET- Plagiarism Checker
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
A Behavior-based Approach to Secure and Resilient Industrial Control Systems
IRJET- Android Malware Detection using Deep Learning
Penetration testing services
Predicting Defects Using Change Genealogies (ISSE 2013)
Advantages of a Paperless Laboratory with an ELN
Nonadaptive mastermind algorithms for string and vector databases, with case ...
A Survey on Bug Tracking System for Effective Bug Clearance
abstract
Syndromic surveillance - Health Analytics on Social Media
resume_cs
Evaluating the possibility of integrating augmented reality and internet of t...
Res_010717
TriggerScope: Towards Detecting Logic Bombs in Android Applications
Some insights from a Systematic Mapping Study and a Systematic Review Study: ...
Ad

Similar to Reverse Engineering android Malware analysis (20)

PDF
Android Malware Detection in Official and Third Party Application Stores
PDF
Final_Presentation_FlowDroid
PDF
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
PDF
20120140504023
PDF
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
PDF
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
PDF
Permission Driven Malware Detection using Machine Learning
PDF
Android Malware Detection Literature Review
PDF
Permission based Android Malware Detection using Random Forest
PDF
IRJET - System to Identify and Define Security Threats to the users About The...
PDF
IRJET- Effective Technique Used for Malware Detection using Machine Learning
PPTX
NYIT research on malware detection in android devices
PPTX
Droidcon mobile security
PDF
Irjet v7 i3811
PDF
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
PDF
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
PDF
thesisSlides
PDF
thesisSlides
PPTX
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
PDF
Taxonomy mobile malware threats and detection techniques
Android Malware Detection in Official and Third Party Application Stores
Final_Presentation_FlowDroid
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
20120140504023
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
Permission Driven Malware Detection using Machine Learning
Android Malware Detection Literature Review
Permission based Android Malware Detection using Random Forest
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET- Effective Technique Used for Malware Detection using Machine Learning
NYIT research on malware detection in android devices
Droidcon mobile security
Irjet v7 i3811
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
thesisSlides
thesisSlides
Dissecting State-of-the-Art Android Malware Using Static and Dynamic Analysis
Taxonomy mobile malware threats and detection techniques
Ad

Recently uploaded (20)

PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Website Design Services for Small Businesses.pdf
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PPTX
history of c programming in notes for students .pptx
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PPTX
assetexplorer- product-overview - presentation
PDF
Nekopoi APK 2025 free lastest update
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
Patient Appointment Booking in Odoo with online payment
Monitoring Stack: Grafana, Loki & Promtail
Designing Intelligence for the Shop Floor.pdf
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Weekly report ppt - harsh dattuprasad patel.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Website Design Services for Small Businesses.pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
history of c programming in notes for students .pptx
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Oracle Fusion HCM Cloud Demo for Beginners
assetexplorer- product-overview - presentation
Nekopoi APK 2025 free lastest update
17 Powerful Integrations Your Next-Gen MLM Software Needs
Advanced SystemCare Ultimate Crack + Portable (2025)
Salesforce Agentforce AI Implementation.pdf
Autodesk AutoCAD Crack Free Download 2025
Patient Appointment Booking in Odoo with online payment

Reverse Engineering android Malware analysis

  • 1. MINING APPS FOR ABNORMAL USAGE OF SENSITIVE DATA By Anik Ralhan(Paper 8 – Security) Course Name: SENG 607 L01 - Special Topics in Software Engineering Supervisor: Prof. Hadi Hemmati 1
  • 3. Authors PhD student, Since summer 2014 I'm working as a research assistant at Software Engineering chair Saarland University Vitalii Avdiienko Konstantin Kuznetsov PhD student in the Software Engineering Chair at Saarland University Alessandra Gorla Assistant researcher professor at the IMDEA Software Institute in Madrid, Spain. 3
  • 4. Authors Contd. Andreas Zeller Full professor for Software Engineering at Saarland University in Germany 4
  • 5. Authors Contd. Head of Department Secure Software Engineering at Fraunhofer SIT Steven Arzt Siegfried Rasthofer Researcher, Fraunhofer Institute for Secure Information Technology Head of program committee of ACM International Symposium on Engineering Secure Software and Systems (ESSoS) Prof. Dr. Eric Bodden 5
  • 6. Task Detect whether a mobile application behaves as expected is a prominent problem for users. 6
  • 8. Technique Contd. Triage: Depending on workload, analysis what, how and fix. Static: Like reading a map for directions on where to go. Dynamic: deeper analysis of the program to understand hidden functionality. 8
  • 9. Technique: MUDFLOW Not just a pattern match. Trained with flow of data in benign apps. compares behavior of mined large set of benign apps. If abnormal, it declares as Malicious!!!!!!!!! 9
  • 14. Method Contd. Flowdroid: The static taint analysis tool with 86% precise & 93% recall on DroidBench Analysis is based on Soot, Heros and SuSi. Necessary meta information are extracted from Android’s manifest file, dex files and layout xml files. Step 1 14
  • 17. Method Contd. java -Xmx4g -cp soot-trunk.jar;soot-infoflow.jar;soot-infoflow- android.jar;slf4j-api-1.7.5.jar;slf4j-simple-1.7.5.jar;axml-2.0.jar soot.jimple.infoflow.android.TestApps.Test "InsecureBank.apk" C:UsersanikDownloadssdkplatforms Heap size dependencies Input file 17
  • 19. Method Contd. No. of source & sinks Sink from source connection Performance analysis 19
  • 20. Method Contd. Automatic classification using ORCA method. Bay & Schwabacher introduced this technique in 2003 in their research paper. Step 2 & 3 20
  • 21. Data The initial test was conducted in March 2014 on 2950 apps from 30 app category. 2866 apps they could test. Benign 25,577 apps selected from VirusShare and Genom malware projects . 15,338 apps were actually test. Malicious 21
  • 22. Data Contd. Ignored Log & Intent. Network & SMS_MMS sinks. False positives were almost 18.7 % while recognizing false positives. Outlier score in individual categories are good indicators of malicious behavior. 22
  • 23. Related Work Hp Fortify - different kinds of findings Data flows from sensitive sources to public sinks Requests for security-sensitive permissions. Calls to security-sensitive methods. LeakMiner – appears similar to Mudflow an app can be analyzed in 2.5 minutes on average. 23
  • 24. Critique FlowDroid performance tuning technique is not used to fix 16 apps RAM size issue. 24
  • 25. Extension Optimize analysis so that apps of varied sizes can be analyzed.1 Provide results in comparison commercial tools available in market like we discussed and conduct a survey with industry experts. 2 25
  • 26. Summary Researchers of paper Task – Android apk malware analysis Technique – Reverse Engineering of .apk file Triage, Static and Dynamic Analysis Mudflow Motivation – Local Restaurant example Method – Static analysis tools Step1 FlowDroid Step2 ORCA method Step3 Aggregate step 2 scores Data set – Benign 2866 Malicious 15338 Related work – Commercial tool HP fortify, IBM AppScan LeakMiner Critique – FlowDroid performance tuning Extension – Optimization, Survey with experts 26