Using Implicit Calls to Improve Malware Dynamic Execution - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Poster De Conférence Année : 2016

Using Implicit Calls to Improve Malware Dynamic Execution

Résumé

The number of Android malware has been increasing for the last 5 years. These malware use more often evasion techniques to hide their malicious intent and avoid analysis tools. In this work, we focus on triggering the most suspicious parts of code in malicious applications in order to monitor their behaviors using dynamic analysis tools for a better understanding of their activities. To do this, a global control flow graph (CFG) is used to exhibit an execution path to reach specific parts of code. Here we explain why using only explicit interprocedural calls may lead to a partial build of the CFG. In this poster, we explain that concept and propose a solution that improves malicious code reachability by means of integrating implicit calls.
Fichier principal
Vignette du fichier
poster_origin.pdf (973.88 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-01304326 , version 1 (19-05-2016)

Identifiants

  • HAL Id : hal-01304326 , version 1

Citer

Mourad Leslous, Jean-François Lalande, Valérie Viet Triem Tong. Using Implicit Calls to Improve Malware Dynamic Execution. 37th IEEE Symposium on Security and Privacy, May 2016, San Jose, United States. ⟨hal-01304326⟩
279 Consultations
77 Téléchargements

Partager

Gmail Facebook X LinkedIn More