论文标题

Armand:基于本地检测

ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection

论文作者

Merlo, Alessio, Ruggia, Antonio, Sciolla, Luigi, Verderame, Luca

论文摘要

重新包装是指自定义现有移动应用程序并将其重新分配到野外的实践,以欺骗最终用户以安装重新包装的应用程序而不是原始应用程序。这样,攻击者可以将恶意有效载荷嵌入到合法的应用程序中,以实现不同的目的,例如访问高级功能,重定向收入或访问用户的私人数据。在Android生态系统中,可以在公共商店中获得应用程序,并且应用程序正确执行的唯一要求是数字签名。因此,重新包装的威胁被广泛传播。反补给技术旨在使攻击的重新包装过程更加困难,从而在编译时在应用程序中添加了逻辑控件(称为检测节点)。此类控制在运行时检查应用程序完整性以检测篡改。如果确认篡改,则检测节点会导致重新包装的应用程序失败(例如,抛出例外)。从攻击者的角度来看,她必须检测并绕过所有控件以安全地重新包装。在这项工作中,我们提出了一种新型的反补给计划 - 称为Armand-,旨在克服当前保护方案的局限性。我们已将此方案实施到一个原型(称为Armandroid)中,该原型利用多种保护模式并依赖于本机代码。 Armandroid在30.000个现实世界Android应用程序上的评估阶段表明,该方案对公共攻击矢量具有牢固的态度,并且在时间和空间上的效率上有效。

App repackaging refers to the practice of customizing an existing mobile app and redistributing it in the wild to fool the final user into installing the repackaged app instead of the original one. In this way, an attacker can embed malicious payload into a legitimate app for different aims, such as access to premium features, redirect revenue, or access to user's private data. In the Android ecosystem, apps are available on public stores, and the only requirement for an app to execute properly is to be digitally signed. Due to this, the repackaging threat is widely spread. Anti-repackaging techniques aim to make harder the repackaging process for an attack adding logical controls - called detection node - in the app at compile-time. Such controls check the app integrity at runtime to detect tampering. If tampering is recognized, the detection nodes lead the repackaged app to fail (e.g., throwing an exception). From an attacker's standpoint, she must detect and bypass all controls to repackage safely. In this work, we propose a novel anti-repackaging scheme - called ARMAND - which aims to overcome the limitations of the current protection schemes. We have implemented this scheme into a prototype - named ARMANDroid - which leverages multiple protection patterns and relies on native code. The evaluation phase of ARMANDroid on 30.000 real-world Android apps showed that the scheme is robust against the common attack vectors and efficient in terms of time and space overhead.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源