appsplayground automatic security analysis of smartphone
play

AppsPlayground: Automatic Security Analysis of Smartphone - PowerPoint PPT Presentation

AppsPlayground: Automatic Security Analysis of Smartphone Applications Vaibhav Rastogi , Yan Chen, and William Enck Lab for Internet and Security Technology, Northwestern University North Carolina State University h li S i i 1


  1. AppsPlayground: Automatic Security Analysis of Smartphone Applications Vaibhav Rastogi , Yan Chen, and William Enck † Lab for Internet and Security Technology, Northwestern University † † North Carolina State University h li S i i 1

  2. Android Threats Android Threats • Privacy leakage Privacy leakage – Users often have no way to know if there are privacy leaks privacy leaks – Even legitimate apps may leak private information without informing user without informing user • Malware – Number increasing consistently Number increasing consistently – Need to analyze new kinds flickr.com/photos/panda_security_france/ 2

  3. Requirements Requirements • Large number of apps in online app stores Large number of apps in online app stores – Google Play has over 700,000 apps – This number is constantly increasing This number is constantly increasing • Offline analysis is important to protect users • Need a scalable and automatic approach to tackle threats • Possible techniques: dynamic analysis and static analysis 3

  4. Dynamic vs. Static Dynamic vs. Static Dynamic Analysis y a c a ys s Static Analysis Stat c a ys s Coverage Some code not Mostly sound executed Accuracy False negatives False positives Dynamic Aspects Handled without Possibly unsound (reflection, additional effort for these dynamic loading) Execution context E i E Easily handled il h dl d Diffi Difficult to handle l h dl Performance Usually slower Usually faster 4

  5. AppsPlayground AppsPlayground • A system for offline dynamic analysis A system for offline dynamic analysis – Includes multiple detection techniques for dynamic analysis dynamic analysis • Challenges • Challenges – Techniques must be light ‐ weight – Automation requires good exploration techniques A t ti i d l ti t h i 5

  6. Outline Outline • Architecture Architecture • Applications and Results li i d l • Related Work • Conclusion and Future Work 6

  7. Outline Outline • Architecture Architecture • Applications and Results li i d l • Related Work • Conclusion and Future Work 7

  8. Architecture Architecture … ues Event on Techniqu triggering AppsPlayground Intelligent Exploratio input Virtualized Dynamic Analysis Environment Fuzzing monitoring … Kernel ‐ level Taint API monitoring g tracking g g Detection Techniques Disguise techniques techniques 8

  9. Architecture Architecture … ues Event on Techniqu triggering AppsPlayground Intelligent Intelligent Exploratio i i input input Virtualized Dynamic Analysis Environment Fuzzing monitoring … Kernel ‐ level Kernel level Taint API Contributions monitoring monitoring tracking g g Detection Techniques Disguise techniques techniques 9

  10. Kernel ‐ level Monitoring Kernel level Monitoring • Useful for malware detection Useful for malware detection • Most root ‐ capable malware can be logged for vulnerability conditions vulnerability conditions • Rage ‐ against ‐ the ‐ cage – Number of live processes for a user reaches a Number of live processes for a user reaches a threshold • Exploid / Gingerbreak p / g – Netlink packets sent to system daemons y 10

  11. Intelligent Input Intelligent Input • Fuzzing is good but has limitations Fuzzing is good but has limitations • Another black ‐ box GUI exploration technique • Capable of filling meaningful text by inferring C bl f filli i f l b i f i surrounding context – Automatically fill out zip codes, phone numbers and even login credentials – Sometimes increases coverage greatly 11

  12. Disguise Techniques Disguise Techniques • Make the virtualized environment look like a real phone real phone – Phone identifiers and properties – Data on phone, such as contacts, SMS, files D h h SMS fil – Data from sensors like GPS – Cannot be perfect 12

  13. Outline Outline • Architecture Architecture • Applications and Results li i d l • Related Work • Conclusion and Future Work 13

  14. Privacy Leakage Results Privacy Leakage Results • AppsPlayground automates TaintDroid AppsPlayground automates TaintDroid • Large scale measurements ‐ 3,968 apps from l 3 968 f Android Market (Google Play) – 946 leak some info – 844 leak phone identifiers – 212 leak geographic location – Leaks to a number of ad and analytics domains 14

  15. Malware Detection Malware Detection • Case studies on DroidDream, FakePlayer, and DroidKungfu DroidKungfu • AppsPlayground’s detection techniques are effective at detecting malicious functionality ff i d i li i f i li • Exploration techniques can help discover more sophisticated malware 15

  16. Exploration Effectiveness Exploration Effectiveness • Measured in terms of code coverage easu ed te s o code co e age – 33% mean code coverage • More than double than trivial • Black box technique • Some code may be dead code • Use symbolic execution in the future y • Fuzzing and intelligent input both important – Fuzzing helps when intelligent input can’t model GUI – Intelligent input could sign up automatically for 34 different services in large scale experiments 16

  17. Outline Outline • Architecture Architecture • Applications and Results li i d l • Related Work • Conclusion and Future Work 17

  18. Related Work Related Work • Google Bouncer Google Bouncer – Similar aims; closed system • DroidScope Usenix Security’12 • DroidScope, Usenix Security’12 – Malware forensics – Mostly manual • SmartDroid, SPSM’12 – Uses static analysis to guide dynamic exploration – Complementary to our approach 18

  19. Conclusions and Future Work Conclusions and Future Work • AppsPlayground is a system for large ‐ scale, pps ayg ou d s a syste o a ge sca e, automatic dynamic analysis of Android apps – Multiple detection, exploration, and disguise techniques • Future work – Symbolic execution S b li i – Improve disguise techniques • Release • Release – Check back soon at http://list.northwestern.edu/mobile.html p // / 19

Recommend


More recommend