Malware in motion

Robert Choudhury, Zhiyuan Luo, Khuong An Nguyen

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

Abstract

Malicious software (malware) is designed to circumvent the security policy of the host device. Smartphones represent an attractive target to malware authors as they are often a rich source of sensitive information. Attractive targets for attackers are sensors (such as cameras or microphones) which allow observation of the victims in real time.

To counteract this threat, there has been a tightening of privileges on mobile devices with respect to sensors, with app developers being required to declare which sensors they need access to, as well as the users needing to give consent.

We demonstrate by conducting a survey of publicly accessible malware analysis platforms that there are still implementations of sensors which are trivial to detect without exposing the malicious intent of a program. We also show how that, despite changes to the permission model, it is still possible to fingerprint an analysis environment even when the analysis is carried using a physical device with the novel use of Android's Activity Recognition API.
Original languageEnglish
Title of host publication8th International Conference on Information Systems Security and Privacy (ICISSP 2022)
Number of pages10
Publication statusAccepted/In press - 9 Feb 2022
Event8th International Conference on Information Systems Security and Privacy (ICISSP 2022) -
Duration: 9 Feb 202211 Feb 2022
https://icissp.scitevents.org

Conference

Conference8th International Conference on Information Systems Security and Privacy (ICISSP 2022)
Period9/02/2211/02/22
Internet address

Keywords

  • Dynamic Analysis
  • Reverse Turing
  • Mobile Security

Fingerprint

Dive into the research topics of 'Malware in motion'. Together they form a unique fingerprint.

Cite this