8. Security of Mobile Devicesinformation through native methods and IPC, TaintDroid patches JNI callbridges and the Binder IPC library. TaintDroid is effective, as it allows taintingto propagate between many different levels, and efficient, as it does so with avery low overhead. Unfortunately, this comes at the expense of low resiliencyand transparency: modifying internal Android components inevitably exposesTaintDroid to a series of detection and evasion techniques [121, 341, 355].DroidBox is a dynamic in-the-box Android malware analyzer [372] thatuses the custom instrumentation of the Android system and kernel to track asample’s behavior, relying on TaintDroid to perform taint tracking of sensitiveinformation [167]. Building on TaintDroid and instrumenting Android’s internalcomponents makes DroidBox prone to the problems of in-the-box analyses:malware can detect and evade the analyses or, worse, even disable them.Andrubis [7] is an extension to the Anubis dynamic malware analysissystem to analyze Android malware [99, 220]. According to its web site, it ismainly built on top of both TaintDroid [167] and DroidBox [372] and it thusshares their weaknesses (mainly due to operating “in-the-box”).CopperDroid performs automatic out-of-the-box dynamic behavioral analysisof Android malware [11, 331]. To this end, CopperDroid presents a unifiedsystem call-centric analysis to characterize low-level OS-specific and high-levelAndroid-specific behaviors, including IPC and RPC interactions—of paramountimportance on Android. Based on the observation that such behaviors are alleventually achieved through the invocation of system calls, CopperDroid’sVM-based dynamic system call-centric analysis is able to faithfully describethe behavior of Android malware whether it is initiated from Java, JNI ornative code execution. Based on the observation that Android applications areinherently user-driven and feature a number of implicit but well-defined entrypoints, CopperDroid furthermore describes the design and implementationof a stimulation approach aimed at disclosing additional malware behaviors.The authors carried out an extensive evaluation of the system to assess itseffectiveness on three different Android malware data sets: one of more than1,200 samples belonging to 49 Android malware families (Android MalwareGenome Project); one containing about 400 samples over 13 families (Contagioproject); and a final one, previously unanalyzed, comprising more than 1,300samples, provided by McAfee. Their experiments show that CopperDroid’sunified system call-based analysis faithfully describes OS- and Android-specificbehaviors, while a proper malware stimulation strategy (e.g., sending SMS,placing calls) successfully discloses additional behaviors in a non-negligibleportion of the analyzed malware samples.Google Bouncer [260], as its name suggests, is a service that “bounces”malicious applications off from the official Google Play (market). Little isknown about it, except that it is a QEMU-based dynamic analysis framework.62
8.4. State of the ArtAll the other information come from reverse-engineering attempts [303] and itis thus hard to compare it to any other research-oriented approach.DroidMOSS [414] relies on signatures for detecting malware in app markets.Similarly, DroidRanger [417] and JuxtApps [207] identify known mobile malwarerepackaged in different apps. Although quite successful, signature-basedtechniques limit the detection effectiveness only to known malware (and itis vulnerable to the adoption of reflection, native code, and obfuscation ingeneral).Enck et al. [168] reported on a study of Android permissions found ina large dataset of Google Play apps, aimed at understanding their securitycharacteristics. Such an understanding is an interesting starting point tobootstrap the design of techniques that are able to enforce security policies [402]and avoid the installation of apps requesting a dangerous combination [169]or an overprivileged set of permissions [178, 312]. Although promising, thepeculiarity of Android apps (e.g., a potential combination of Java and nativecode) can easily elude policy enforcement (when confined to protecting the JavaAPI—as represented by the state-of-the-art) or collude to perform maliciousactions while maintaining a legitimate-seeming appearance. This clearly callsfor continuing research in this direction.Aurasium [402] is an app rewriting framework (Java only) that enablesdynamic and fine-grained policy enforcement of Android applications. Unfortunately,working at the application level exposes Aurasium to easy detectionor evasion attacks by malicious Android applications. For example, regularapplications can rely on native code to detect and disable hooks in the globaloffset table, even without privilege escalation exploits.SmartDroid [413] makes use of hybrid analyses that statically identify pathsleading to suspicious actions (e.g., accessing sensitive data) and dynamicallydetermine UI elements that take the execution flow down paths identified bythe static analysis. To this end, the authors instrument both the Android emulatorand Android’s internal components to infer which UI elements can triggersuspicious behaviors. In addition, they evaluate SmartDroid on a testbedof 7 different malware samples. Unfortunately, SmartDroid is vulnerable toobfuscation and reflection, which make it hard—if not impossible—to staticallydetermine every possible execution path.Anand et al. propose ACTEve [83], an algorithm that utilizes concolicexecution to automatically generate input events for smartphone applications.ACTEve is fully automatic: it does not require a learning phase (such ascapture-and-replay approaches) and uses novel techniques to prevent the pathexplosionproblem. Unfortunately, the average running time of ACTEve fallswithin the range of hours, which makes it ill-suited to automated large scaleanalyses or practical in-device detection.63
- Page 1:
SEVENTH FRAMEWORK PROGRAMMETHERED B
- Page 4 and 5:
The Red Book. ©2013 The SysSec Con
- Page 7 and 8:
PrefaceAfter the completion of its
- Page 9 and 10:
Contents1 Executive Summary 32 Intr
- Page 11 and 12:
1 Executive SummaryBased on publish
- Page 13:
1.2. Grand Challenges4. will have t
- Page 16 and 17:
2. Introductionwho want to get at t
- Page 18 and 19:
2. Introduction• Although conside
- Page 20 and 21: 2. Introductionfuture, where each a
- Page 22 and 23: 2. Introductiondrones), such sensor
- Page 24 and 25: 2. Introductioncover our energy nee
- Page 27: Part I: Threats Identified
- Page 30 and 31: 3. In Search of Lost Anonymity3.2 W
- Page 32 and 33: 3. In Search of Lost Anonymityguide
- Page 35 and 36: 4 Software VulnerabilitiesExtending
- Page 37 and 38: 4.1. What Is the Problem?infrastruc
- Page 39 and 40: 4.5. State of the Artparts of criti
- Page 41: 4.7. Example Problemstem mitigation
- Page 44 and 45: 5. Social Networks5.1 Who Is Going
- Page 46 and 47: 5. Social Networksby such an applic
- Page 48 and 49: 5. Social Networksdisasters. This r
- Page 50 and 51: 6. Critical Infrastructure Security
- Page 52 and 53: 6. Critical Infrastructure Security
- Page 54 and 55: 6. Critical Infrastructure Security
- Page 56 and 57: 6. Critical Infrastructure Security
- Page 59 and 60: 7 Authentication and AuthorizationH
- Page 61 and 62: 7.2. Who Is Going to Be Affected?so
- Page 63 and 64: 7.5. State of the ArtFinally, ident
- Page 65 and 66: 7.6. Research Gapshashes and evalua
- Page 67 and 68: 8 Security of Mobile DevicesIn an e
- Page 69: 8.3. What Is the Worst That Can Hap
- Page 73: 8.6. Example Problemserated anomaly
- Page 76 and 77: 9. Legacy Systemsthe execution of a
- Page 78 and 79: 9. Legacy Systemsparts of the progr
- Page 81 and 82: 10 Usable SecurityKeys, locks, and
- Page 83 and 84: 10.4. What Is the Worst That Can Ha
- Page 85 and 86: 10.6. Research Gaps10.6 Research Ga
- Page 87: 10.7. Example Problemsof value for
- Page 90 and 91: 11. The Botnet that Would not DieNu
- Page 92 and 93: 11. The Botnet that Would not Diefa
- Page 94 and 95: 11. The Botnet that Would not Dieti
- Page 96 and 97: 12. Malwarethan 128 million malware
- Page 98 and 99: 12. Malwareequipped with auto-updat
- Page 100 and 101: 12. Malwarethe introduction of App
- Page 102 and 103: 13. Social Engineering and Phishing
- Page 104 and 105: 13. Social Engineering and Phishing
- Page 106 and 107: 13. Social Engineering and Phishing
- Page 108 and 109: 13. Social Engineering and Phishing
- Page 111 and 112: 14 Grand ChallengesOne of the most
- Page 113: Part II: Related Work
- Page 116 and 117: 15. A Crisis of Prioritization•
- Page 118 and 119: 16. Forwardare accessible from the
- Page 120 and 121:
16. ForwardRecommendation 4: “The
- Page 122 and 123:
17. Federal Plan for Cyber Security
- Page 124 and 125:
17. Federal Plan for Cyber Security
- Page 126 and 127:
18. EffectsPlus18.1 Roadmap Structu
- Page 128 and 129:
18. EffectsPlus18.6 Identified Prio
- Page 130 and 131:
19. Digital GovernmentThe roadmap o
- Page 132 and 133:
20. Horizon2020• “Making cyber
- Page 135 and 136:
21 Trust in the Information Society
- Page 137:
21.2. Recommendationsallows for the
- Page 140 and 141:
22. ENISA Threat Landscape2. Malwar
- Page 142 and 143:
22. ENISA Threat LandscapeSocial Te
- Page 144 and 145:
22. ENISA Threat Landscapewriters w
- Page 146 and 147:
23. Cyber Security Research Worksho
- Page 149 and 150:
24 Cyber Security Strategy of theEu
- Page 151 and 152:
24.2. Strategic PrioritiesProposed
- Page 153 and 154:
25 The Dutch National Cyber Securit
- Page 155 and 156:
25.1. ContextsInternet (e.g., smart
- Page 157 and 158:
25.1. Contextsdefensive approaches
- Page 159 and 160:
25.2. Research Themesand radio broa
- Page 161 and 162:
25.2. Research Themesconsists of se
- Page 163 and 164:
25.2. Research ThemesRisk managemen
- Page 165 and 166:
AMethodologiesIn this appendix we o
- Page 167 and 168:
BSysSec Threats Landscape Evolution
- Page 169 and 170:
B.4. SysSec 2013 Threats LandscapeT
- Page 171 and 172:
B.4. SysSec 2013 Threats LandscapeS
- Page 173 and 174:
Bibliography[1] 10 Questions for Ke
- Page 175 and 176:
Bibliography[45] SCADA & Security o
- Page 177 and 178:
Bibliography[88] A. Avizienis, J.-C
- Page 179 and 180:
Bibliography[130] G. Cluley. 600,00
- Page 181 and 182:
Bibliography[172] D. Evans. Top 25
- Page 183 and 184:
Bibliography[214] ICS-CERT. Monthly
- Page 185 and 186:
Bibliography[253] C. Lever, M. Anto
- Page 187 and 188:
Bibliography[291] Mozilla. Browseri
- Page 189 and 190:
Bibliography[329] F. Raja, K. Hawke
- Page 191 and 192:
Bibliography[370] T. Telegraph. Bog
- Page 193 and 194:
Bibliography[407] W. Yang, N. Li, Y