Abstract
Malicious software (malware) is designed to circumvent the security policy of the host device. Smartphones represent an attractive target to malware authors as they are often a rich source of sensitive information. Attractive targets for attackers are sensors (such as cameras or microphones) which allow observation of the victims in real time.
To counteract this threat, there has been a tightening of privileges on mobile devices with respect to sensors, with app developers being required to declare which sensors they need access to, as well as the users needing to give consent.
We demonstrate by conducting a survey of publicly accessible malware analysis platforms that there are still implementations of sensors which are trivial to detect without exposing the malicious intent of a program. We also show how that, despite changes to the permission model, it is still possible to fingerprint an analysis environment even when the analysis is carried using a physical device with the novel use of Android's Activity Recognition API.
To counteract this threat, there has been a tightening of privileges on mobile devices with respect to sensors, with app developers being required to declare which sensors they need access to, as well as the users needing to give consent.
We demonstrate by conducting a survey of publicly accessible malware analysis platforms that there are still implementations of sensors which are trivial to detect without exposing the malicious intent of a program. We also show how that, despite changes to the permission model, it is still possible to fingerprint an analysis environment even when the analysis is carried using a physical device with the novel use of Android's Activity Recognition API.
Original language | English |
---|---|
Title of host publication | 8th International Conference on Information Systems Security and Privacy (ICISSP 2022) |
Number of pages | 10 |
Publication status | Published - 9 Feb 2022 |
Event | 8th International Conference on Information Systems Security and Privacy (ICISSP 2022) - Duration: 9 Feb 2022 → 11 Feb 2022 https://icissp.scitevents.org |
Conference
Conference | 8th International Conference on Information Systems Security and Privacy (ICISSP 2022) |
---|---|
Period | 9/02/22 → 11/02/22 |
Internet address |
Keywords
- Dynamic Analysis
- Reverse Turing
- Mobile Security