Abstract
Emulator-based dynamic analysis has been widely deployed in Android application stores. While it has been proven effective in vetting applications on a large scale, it can be detected and evaded by recent Android malware strains that carry detection heuristics. Using such heuristics, an application can check the presence or contents of certain artifacts and infer the presence of emulators. However, there exists little work that systematically discovers those heuristics that would be eventually helpful to prevent malicious applications from bypassing emulator-based analysis. To cope with this challenge, we propose a framework called Morpheus that automatically generates such heuristics. Morpheus leverages our insight that an effective detection heuristic must exploit discrepancies observable by an application. To this end, Morpheus analyzes the application sandbox and retrieves observable artifacts from both Android emulators and real devices. Afterwards, Morpheus further analyzes the retrieved artifacts to extract and rank detection heuristics. The evaluation of our proof-of-concept implementation of Morpheus reveals more than 10,000 novel detection heuristics that can be utilized to detect existing emulator-based malware analysis tools. We also discuss the discrepancies in Android emulators and potential countermeasures.
Original language | English (US) |
---|---|
Title of host publication | ACM International Conference Proceeding Series |
Publisher | Association for Computing Machinery |
Pages | 216-225 |
Number of pages | 10 |
Volume | 2014-December |
Edition | December |
DOIs | |
State | Published - Dec 8 2014 |
Event | 30th Annual Computer Security Applications Conference, ACSAC 2014 - New Orleans, United States Duration: Dec 8 2014 → Dec 12 2014 |
Other
Other | 30th Annual Computer Security Applications Conference, ACSAC 2014 |
---|---|
Country/Territory | United States |
City | New Orleans |
Period | 12/8/14 → 12/12/14 |
Keywords
- Android
- Emulator
- Malware
ASJC Scopus subject areas
- Human-Computer Interaction
- Computer Networks and Communications
- Computer Vision and Pattern Recognition
- Software