Mobile Konami Codes: Analysis of Android Malware Services Utilizing Sensor And Resource-Based State Changes
Author
Boomgaarden, J.
Corney, J.
Whittaker, H.
Dinolt, G.
McEachen, J.
Date
2016Metadata
Show full item recordAbstract
Challenges in static analysis of mobile malware
have stimulated the need for emulated, dynamic
analysis techniques. Unfortunately, emulating mobile
devices is nontrivial because of the different types of
hardware features onboard (e.g., sensors) and the
manner in which users interact with their devices as
compared to traditional computing platforms. To test
this, our research focuses on the enumeration and
comparison of static attributes and dynamic event
values from sensors and resources within Android
runtime environments on physical devices and within
several online services’ analysis environments.
Utilizing the results from enumeration, we develop
two different Android applications that are successful
in detecting and evading the emulated environments
utilized by those mobile analysis services during
execution. When ran on physical devices, the same
applications successfully perform a pseudo-malware
action and send device identifying information to our
server.
Description
The article of record as published may be found at http://dx.doi.org/10.1109/HICSS.2016.690
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
A survey and analysis of high density mass storage devices and systems
Schneidewind, Norman F.; Syms, Gordon H.; Grainger, Thomas L.; Carden, Robert J. (Monterey, California. Naval Postgraduate School, 1972-07); NPS-558S72071A survey and analysis has been made of high density mass storage systems for the Navy Fleet Material Support Office. The purpose of the project was to survey mass storage devices and systems and to select several devices ... -
Feasibility analysis and design of a fault tolerant computing system: a TMR microprocessor system design of 64-Bit COTS microprocessors
Eken, Huseyin Baha (2001-03);The purpose of this thesis is to analyze and determine the feasibility of implementing a fault tolerant computing system that is able to function in the presence of radiation induced Single Event Upsets (SEU) by using the ... -
A STATISTICAL ANALYSIS AND ASSESSMENT OF THE IMSI-CATCHING THREAT AGAINST MOBILE SECURITY STANDARDS
Johnson, Carmen A. (Monterey, CA; Naval Postgraduate School, 2020-06);International mobile subscriber identity (IMSI) catching is a man-in-the-middle attack that utilizes rogue base stations to intercept the IMSIs of mobile users. Attackers can use software-defined radios (SDR) and open ...