TY - GEN
T1 - StaDynA
T2 - 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015
AU - Zhauniarovich, Y.
AU - Ahmad, M.
AU - Gadyatskaya, O.
AU - Crispo, B.
AU - Massacci, F.
PY - 2015/3/2
Y1 - 2015/3/2
N2 - Copyright © 2015 ACM.Static analysis of Android applications can be hindered by the presence of the popular dynamic code update techniques: dynamic class loading and reflection. Recent Android mal- ware samples do actually use these mechanisms to conceal their malicious behavior from static analyzers. These tech- niques defuse even the most recent static analyzers (e.g., [12, 21, 31]) that usually operate under the "closed world" assumption (the targets of reflective calls can be resolved at analysis time; only classes reachable from the class path at analysis time are used at runtime). Our proposed solution allows existing static analyzers to remove this assumption. This is achieved by combining static and dynamic analysis of applications in order to reveal the hidden/updated behav- ior and extend static analysis results with this information. This paper presents design, implementation and preliminary evaluation results of our solution called StaDynA.
AB - Copyright © 2015 ACM.Static analysis of Android applications can be hindered by the presence of the popular dynamic code update techniques: dynamic class loading and reflection. Recent Android mal- ware samples do actually use these mechanisms to conceal their malicious behavior from static analyzers. These tech- niques defuse even the most recent static analyzers (e.g., [12, 21, 31]) that usually operate under the "closed world" assumption (the targets of reflective calls can be resolved at analysis time; only classes reachable from the class path at analysis time are used at runtime). Our proposed solution allows existing static analyzers to remove this assumption. This is achieved by combining static and dynamic analysis of applications in order to reveal the hidden/updated behav- ior and extend static analysis results with this information. This paper presents design, implementation and preliminary evaluation results of our solution called StaDynA.
UR - https://www.scopus.com/pages/publications/84928156461
UR - https://www.scopus.com/inward/citedby.url?scp=84928156461&partnerID=8YFLogxK
U2 - 10.1145/2699026.2699105
DO - 10.1145/2699026.2699105
M3 - Conference contribution
SN - 9781450331913
T3 - CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
SP - 37
EP - 48
BT - CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
PB - Association for Computing Machinery, Inc
Y2 - 2 March 2015 through 4 March 2015
ER -