SlideShare a Scribd company logo
ALTERDROID: Differential Fault Analysis of Obfuscated
Smartphone Malware
Abstract
Malware for smartphones has rocketed over the last years. Market operators face
the challenge of keeping their stores free from malicious apps, a task that has
become increasingly complex as malware developers are progressively using
advanced techniques to defeat malware detection tools. One such technique
commonly observed in recent malware samples consists of hiding and obfuscating
modules containing malicious functionality in places that static analysis tools
overlook (e.g., within data objects). In this paper, we describe ALTERDROID, a
dynamic analysis approach for detecting such hidden or obfuscated malware
components distributed as parts of an app package. The key idea in ALTERDROID
consists of analyzing the behavioral differences between the original app and a
number of automatically generated versions of it, where a number of modifications
(faults) have been carefully injected. Observable differences in terms of activities
that appear or vanish in the modified app are recorded, and the resulting
differential signature is analyzed through a pattern-matching process driven by
rules that relate different types of hidden functionalities with patterns found in the
signature. A thorough justification and a description of the proposed model are
provided. The extensive experimental results obtained by testing ALTERDROID over
relevant apps and malware samples support the quality and viability of our
proposal
Existing system
Smartphones present a number of security and privacy concerns that are, in many
respects, even more alarming than those existing in traditional computing
environments. Most smart phone platforms are equipped with multiple sensors
that can determine user location, gestures, moves and other physical activities, to
name a few. Smartphones also feature high-quality audio and video recording
capabilities. Sensitive pieces of information that can be captured by these devices
could be easily leaked by malware residing on the smartphone. Even apparently
harmless capabilities have swiftly turned into a potential menace.
Proposed system
In this paper we describe ALTERDROID, a tool for detecting, through reverse
engineering, obfuscated functionality in components distributed as parts of an app
package. Such components are often part of a malicious app and are hidden outside
its main code components (e.g. within data objects), as code components may be
subject to static analysis by market operators. The key idea in ALTERDROID consists
of analyzing the behavioral differences between the original app and an altered
version where a number of modifications (faults) have been carefully introduced.
Such modifications are designed to have no observable effect on the app execution,
provided that the altered component is actually what it should be (i.e., it does not
hide any unwanted functionality). For example, replacing the value of some pixels
in a picture or a few characters in a string encoding an error message should not
affect the execution. However, if after doing so it is observed that a dynamic class
loading action crashes or a network connection does not take place, it may well be
that the picture was actually a piece of code or the string a network address or a
URL.

More Related Content

Similar to ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware

Crafting Tomorrow's Technology Your Guide to Embedded Software Development.pptx
Crafting Tomorrow's Technology Your Guide to Embedded Software Development.pptxCrafting Tomorrow's Technology Your Guide to Embedded Software Development.pptx
Crafting Tomorrow's Technology Your Guide to Embedded Software Development.pptx
HashStudiozTechnolog
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Tyler Shields
 
software Testing and assurance
software Testing and assurancesoftware Testing and assurance
software Testing and assurance
gk300793
 
COVERT app
COVERT appCOVERT app
COVERT app
itba9
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
IRJET Journal
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Anatoliy Tkachev
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
Vincent lefebvre
 
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
csandit
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
IRJET Journal
 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
tsysglobalsolutions
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Daniel zhao
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Комсс Файквэе
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
Комсс Файквэе
 
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptxA Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
Mobile App
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of Code
IRJET Journal
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
IRJET Journal
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for android
JPINFOTECH JAYAPRAKASH
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
IJNSA Journal
 
Developing secure software using Aspect oriented programming
Developing secure software using Aspect oriented programmingDeveloping secure software using Aspect oriented programming
Developing secure software using Aspect oriented programming
IOSR Journals
 
demystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdfdemystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdf
sarah david
 

Similar to ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware (20)

Crafting Tomorrow's Technology Your Guide to Embedded Software Development.pptx
Crafting Tomorrow's Technology Your Guide to Embedded Software Development.pptxCrafting Tomorrow's Technology Your Guide to Embedded Software Development.pptx
Crafting Tomorrow's Technology Your Guide to Embedded Software Development.pptx
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
 
software Testing and assurance
software Testing and assurancesoftware Testing and assurance
software Testing and assurance
 
COVERT app
COVERT appCOVERT app
COVERT app
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
 
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
Avtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_englishAvtest 2012 02-android_anti-malware_report_english
Avtest 2012 02-android_anti-malware_report_english
 
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptxA Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of Code
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for android
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
Developing secure software using Aspect oriented programming
Developing secure software using Aspect oriented programmingDeveloping secure software using Aspect oriented programming
Developing secure software using Aspect oriented programming
 
demystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdfdemystifying_the_architectures_of_a_mobile_app_development.pdf
demystifying_the_architectures_of_a_mobile_app_development.pdf
 

More from muhammed jassim k

Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
muhammed jassim k
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
Cloud armor:Supporting Reputation-Based Trust Management for Cloud ServiceCloud armor:Supporting Reputation-Based Trust Management for Cloud Service
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
muhammed jassim k
 
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGEELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
muhammed jassim k
 
4.weather based smart watering system using soil sensor and gsm
4.weather based smart watering system using soil sensor and gsm4.weather based smart watering system using soil sensor and gsm
4.weather based smart watering system using soil sensor and gsm
muhammed jassim k
 
26. qo s ranking prediction for cloud services
26. qo s ranking prediction for cloud services26. qo s ranking prediction for cloud services
26. qo s ranking prediction for cloud services
muhammed jassim k
 
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
Energy-Efficient intelligent street lighting system using traffic-adaptive co...Energy-Efficient intelligent street lighting system using traffic-adaptive co...
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
muhammed jassim k
 
Fire col a collaborative protection
Fire col a collaborative protectionFire col a collaborative protection
Fire col a collaborative protection
muhammed jassim k
 
privacy preserving abstract
 privacy preserving abstract privacy preserving abstract
privacy preserving abstract
muhammed jassim k
 
Datamining with big data
 Datamining with big data  Datamining with big data
Datamining with big data
muhammed jassim k
 
33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines
muhammed jassim k
 
An automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networksAn automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networks
muhammed jassim k
 
A location-and Diversity aware News feed system for mobile user
A location-and Diversity aware News feed system for mobile userA location-and Diversity aware News feed system for mobile user
A location-and Diversity aware News feed system for mobile user
muhammed jassim k
 
A feature-Enriched Completely Blind image Quality Evaluator
A feature-Enriched Completely Blind image Quality EvaluatorA feature-Enriched Completely Blind image Quality Evaluator
A feature-Enriched Completely Blind image Quality Evaluator
muhammed jassim k
 
A cloud
A cloudA cloud
Hierarchical supervisory control system for pe vs participating in frequency ...
Hierarchical supervisory control system for pe vs participating in frequency ...Hierarchical supervisory control system for pe vs participating in frequency ...
Hierarchical supervisory control system for pe vs participating in frequency ...
muhammed jassim k
 
On demand retrieval of crowdsourced
On demand retrieval of crowdsourcedOn demand retrieval of crowdsourced
On demand retrieval of crowdsourced
muhammed jassim k
 
Medical warehouse business distribution
Medical warehouse business distributionMedical warehouse business distribution
Medical warehouse business distribution
muhammed jassim k
 
Discoveringlatentsemanticsinweb 160617093617
Discoveringlatentsemanticsinweb 160617093617Discoveringlatentsemanticsinweb 160617093617
Discoveringlatentsemanticsinweb 160617093617
muhammed jassim k
 
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
muhammed jassim k
 

More from muhammed jassim k (20)

Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
Adapter Wavelet Thresholding for Image Denoising Using Various Shrinkage Unde...
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
Cloud armor:Supporting Reputation-Based Trust Management for Cloud ServiceCloud armor:Supporting Reputation-Based Trust Management for Cloud Service
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
 
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGEELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
ELECTRONIC PROTECTION FOR EXAM PAPER LEAKAGE
 
4.weather based smart watering system using soil sensor and gsm
4.weather based smart watering system using soil sensor and gsm4.weather based smart watering system using soil sensor and gsm
4.weather based smart watering system using soil sensor and gsm
 
26. qo s ranking prediction for cloud services
26. qo s ranking prediction for cloud services26. qo s ranking prediction for cloud services
26. qo s ranking prediction for cloud services
 
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
Energy-Efficient intelligent street lighting system using traffic-adaptive co...Energy-Efficient intelligent street lighting system using traffic-adaptive co...
Energy-Efficient intelligent street lighting system using traffic-adaptive co...
 
Fire col a collaborative protection
Fire col a collaborative protectionFire col a collaborative protection
Fire col a collaborative protection
 
privacy preserving abstract
 privacy preserving abstract privacy preserving abstract
privacy preserving abstract
 
Datamining with big data
 Datamining with big data  Datamining with big data
Datamining with big data
 
33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines33. dynamic resource allocation using virtual machines
33. dynamic resource allocation using virtual machines
 
An automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networksAn automated dynamic offset for network selection in heterogeneous networks
An automated dynamic offset for network selection in heterogeneous networks
 
A location-and Diversity aware News feed system for mobile user
A location-and Diversity aware News feed system for mobile userA location-and Diversity aware News feed system for mobile user
A location-and Diversity aware News feed system for mobile user
 
A feature-Enriched Completely Blind image Quality Evaluator
A feature-Enriched Completely Blind image Quality EvaluatorA feature-Enriched Completely Blind image Quality Evaluator
A feature-Enriched Completely Blind image Quality Evaluator
 
A cloud
A cloudA cloud
A cloud
 
Hierarchical supervisory control system for pe vs participating in frequency ...
Hierarchical supervisory control system for pe vs participating in frequency ...Hierarchical supervisory control system for pe vs participating in frequency ...
Hierarchical supervisory control system for pe vs participating in frequency ...
 
On demand retrieval of crowdsourced
On demand retrieval of crowdsourcedOn demand retrieval of crowdsourced
On demand retrieval of crowdsourced
 
Medical warehouse business distribution
Medical warehouse business distributionMedical warehouse business distribution
Medical warehouse business distribution
 
Discoveringlatentsemanticsinweb 160617093617
Discoveringlatentsemanticsinweb 160617093617Discoveringlatentsemanticsinweb 160617093617
Discoveringlatentsemanticsinweb 160617093617
 
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
Raspberrypiprojectsforeceeee 150724094838-lva1-app6891
 

Recently uploaded

LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 

Recently uploaded (20)

LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 

ALTERDROID:Differential fault Analysis of Obfuscated Smartphone Malware

  • 1. ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware Abstract Malware for smartphones has rocketed over the last years. Market operators face the challenge of keeping their stores free from malicious apps, a task that has become increasingly complex as malware developers are progressively using advanced techniques to defeat malware detection tools. One such technique commonly observed in recent malware samples consists of hiding and obfuscating modules containing malicious functionality in places that static analysis tools overlook (e.g., within data objects). In this paper, we describe ALTERDROID, a dynamic analysis approach for detecting such hidden or obfuscated malware components distributed as parts of an app package. The key idea in ALTERDROID consists of analyzing the behavioral differences between the original app and a number of automatically generated versions of it, where a number of modifications (faults) have been carefully injected. Observable differences in terms of activities that appear or vanish in the modified app are recorded, and the resulting differential signature is analyzed through a pattern-matching process driven by rules that relate different types of hidden functionalities with patterns found in the signature. A thorough justification and a description of the proposed model are provided. The extensive experimental results obtained by testing ALTERDROID over relevant apps and malware samples support the quality and viability of our proposal Existing system Smartphones present a number of security and privacy concerns that are, in many respects, even more alarming than those existing in traditional computing environments. Most smart phone platforms are equipped with multiple sensors that can determine user location, gestures, moves and other physical activities, to name a few. Smartphones also feature high-quality audio and video recording
  • 2. capabilities. Sensitive pieces of information that can be captured by these devices could be easily leaked by malware residing on the smartphone. Even apparently harmless capabilities have swiftly turned into a potential menace. Proposed system In this paper we describe ALTERDROID, a tool for detecting, through reverse engineering, obfuscated functionality in components distributed as parts of an app package. Such components are often part of a malicious app and are hidden outside its main code components (e.g. within data objects), as code components may be subject to static analysis by market operators. The key idea in ALTERDROID consists of analyzing the behavioral differences between the original app and an altered version where a number of modifications (faults) have been carefully introduced. Such modifications are designed to have no observable effect on the app execution, provided that the altered component is actually what it should be (i.e., it does not hide any unwanted functionality). For example, replacing the value of some pixels in a picture or a few characters in a string encoding an error message should not affect the execution. However, if after doing so it is observed that a dynamic class loading action crashes or a network connection does not take place, it may well be that the picture was actually a piece of code or the string a network address or a URL.