1
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      On the evaluation of android malware detectors against code-obfuscation techniques

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The Android mobile platform is the most popular and dominates the cell phone market. With the increasing use of Android, malware developers have become active in circumventing security measures by using various obfuscation techniques. The obfuscation techniques are used to hide the malicious code in the Android applications to evade detection by anti-malware tools. Some attackers use the obfuscation techniques in isolation, while some attackers use a mixed approach ( i.e., employing multiple obfuscation techniques simultaneously). Therefore, it is crucial to analyze the impact of the different obfuscation techniques, both when they are used in isolation and when they are combined as hybrid techniques. Several studies have suggested that the obfuscation techniques may be more effective when used in a mixed pattern. However, in most of the related works, the obfuscation techniques used for analysis are either based on individual or a combination of primitive obfuscation techniques. In this work, we provide a comprehensive evaluation of anti-malware tools to gauge the impact of complex hybrid code-obfuscations techniques on malware detection capabilities of the prominent anti-malware tools. The evaluation results show that the inter-category-wise hybridized code obfuscation results in more evasion as compared to the individual or simple hybridized code obfuscations (using multiple and similar code obfuscations) which most of the existing related work employed for the evaluation. Obfuscation techniques significantly impact the detection rate of any anti-malware tool. The remarkable result i.e., almost 100% best detection rate is observed for the seven out of 10 tools when analyzed using the individual obfuscation techniques, four out of 10 tools on category-wise obfuscation, and not a single anti-malware tool attained full detection ( i.e., 100%) for inter-category obfuscations.

          Related collections

          Most cited references19

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Drebin: Effective and Explainable Detection of Android Malware in Your Pocket

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Control flow obfuscation for Android applications

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Obfuscation Techniques against Signature-Based Detection: A Case Study

                Bookmark

                Author and article information

                Contributors
                Journal
                PeerJ Comput Sci
                PeerJ Comput Sci
                peerj-cs
                PeerJ Computer Science
                PeerJ Inc. (San Diego, USA )
                2376-5992
                21 June 2022
                2022
                : 8
                : e1002
                Affiliations
                [1 ]Computer Sciences, National University of Computer and Emerging Sciences, Islamabad , Islamabad, Pakistan
                [2 ]Computer Sciences, Western Norway University of Applied Sciences , Bergen, Norway
                Author information
                http://orcid.org/0000-0001-8342-5757
                Article
                cs-1002
                10.7717/peerj-cs.1002
                9299270
                35875645
                035134a6-9843-488d-9db3-ccb7037dea00
                © 2022 Nawaz et al.

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.

                History
                : 20 December 2021
                : 18 May 2022
                Funding
                Funded by: Western Norway University of Applied Sciences
                This article was supported by Western Norway University of Applied Sciences. There was no additional external funding received for this study. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
                Categories
                Computer Networks and Communications
                Data Science
                Databases
                Security and Privacy

                android,android’s anti-malware system,obfuscation techniques,reverse engineering

                Comments

                Comment on this article