论文标题

Mamadroid2.0-控制流图的孔

MaMaDroid2.0 -- The Holes of Control Flow Graphs

论文作者

Berger, Harel, Hajaj, Chen, Mariconti, Enrico, Dvir, Amit

论文摘要

Android恶意软件是对全球数十亿个移动用户的不断扩展的威胁。不断更新检测系统以应对这些威胁。但是,反弹采取了逃避攻击的形式,其中对手会改变恶意样本,从而将这些样本错误地分类为良性。本文完全检查了著名的Android恶意软件检测系统MamaDroid,该系统分析了应用程序的控制流程图。对火车组中的良性样本部分的变化,并认为模型可以看到它们对分类器的影响。良性和恶意样本之间的比率变化对每个模型都有明显的影响,导致其检测率降低了40%以上。此外,还实施了采用的ML模型,包括5-NN,决策树和Adaboost。对六种模型的探索揭示了在不同情况,基于树模型和基于距离的模型的典型行为。此外,针对每个目标模型描述了操纵CFG的三种新型攻击及其检测率。攻击将大多数模型的检测率降低到0%,而良性和恶意应用的比例不同。结果,设计了新版本的MamaDroid。该模型融合了应用程序的CFG和应用程序功能的静态分析。事实证明,这种改进的模型可抵抗针对基于CFG的模型和静态分析模型的逃避攻击,对每种攻击的检测率超过90%。

Android malware is a continuously expanding threat to billions of mobile users around the globe. Detection systems are updated constantly to address these threats. However, a backlash takes the form of evasion attacks, in which an adversary changes malicious samples such that those samples will be misclassified as benign. This paper fully inspects a well-known Android malware detection system, MaMaDroid, which analyzes the control flow graph of the application. Changes to the portion of benign samples in the train set and models are considered to see their effect on the classifier. The changes in the ratio between benign and malicious samples have a clear effect on each one of the models, resulting in a decrease of more than 40% in their detection rate. Moreover, adopted ML models are implemented as well, including 5-NN, Decision Tree, and Adaboost. Exploration of the six models reveals a typical behavior in different cases, of tree-based models and distance-based models. Moreover, three novel attacks that manipulate the CFG and their detection rates are described for each one of the targeted models. The attacks decrease the detection rate of most of the models to 0%, with regards to different ratios of benign to malicious apps. As a result, a new version of MaMaDroid is engineered. This model fuses the CFG of the app and static analysis of features of the app. This improved model is proved to be robust against evasion attacks targeting both CFG-based models and static analysis models, achieving a detection rate of more than 90% against each one of the attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源