Malware Sandbox Evasion Techniques in Mobile Devices

Y Sankaranarayanan… - International …, 2022 - ijemr.vandanapublications.com
Y Sankaranarayanan, S Ravindran, S Ahamed, K Balendraraja
International Journal of Engineering and Management …, 2022ijemr.vandanapublications.com
The mobile platform is where it's at. There are currently very few professionals who dispute
this view. Because of the rapidly increasing number of smartphones and other devices
powered by the Android operating system all over the world, there has been a
corresponding surge in the number of mobile apps, particularly harmful mobile apps. This
form of malware is very new, but it is rapidly changing, and it brings hazards that have not
been seen before. As a part of Check Point's ongoing efforts against the rising tide of mobile …
Abstract
The mobile platform is where it's at. There are currently very few professionals who dispute this view. Because of the rapidly increasing number of smartphones and other devices powered by the Android operating system all over the world, there has been a corresponding surge in the number of mobile apps, particularly harmful mobile apps. This form of malware is very new, but it is rapidly changing, and it brings hazards that have not been seen before. As a part of Check Point’s ongoing efforts against the rising tide of mobile dangers, we, the Malware Research Team, want to learn as much as we can about the constantly shifting Android malware landscape. This requires understanding the internal operation of as many malicious apps as we can, so we can learn as much as we can. Manual malware analysis has always been a difficult operation, taking days or even weeks to complete for each sample. Because of this, the work is impracticable even for a small sample pool because of the amount of time it takes. Following the successful application of this strategy to mobile malware, our response is to automate as much of the analysis process as is practically practicable. Idan Revivo and Ofer Caspi from Check Point’s Malware Research Team were tasked with developing a system that would take an application and produce a report describing exactly what it does when it is run, specifically pointing out anything" fishy." This would enable us to perform an initial analysis with no human intervention, which is exactly what they have done. The popular CuckooDroid sandbox and a few other open-source projects form the basis of this automated, cross-platform emulation and analysis framework, which allows for static and dynamic APK inspection in addition to evading some VM-detection techniques, encryption key extraction, SSL inspection, API call trace, basic behavioral signatures, and more. It is easy to make changes and add new features to the framework, and it draws heavily on the expertise of the current Cuckoo community.
ijemr.vandanapublications.com
Showing the best result for this search. See all results