skip to main content
10.1145/3422337.3450322acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

Object Allocation Pattern as an Indicator for Maliciousness - An Exploratory Analysis

Published:26 April 2021Publication History

ABSTRACT

Traditionally, Android malware is analyzed using static or dynamic analysis. Although static techniques are often fast; however, they cannot be applied to classify obfuscated samples or malware with a dynamic payload. In comparison, the dynamic approach can examine obfuscated variants but often incurs significant runtime overhead when collecting every important malware behavioral data. This paper conducts an exploratory analysis of memory forensics as an alternative technique for extracting feature vectors for an Android malware classifier. We utilized the reconstructed per-process object allocation network to identify distinguishable patterns in malware and benign application. Our evaluation results indicate the network structural features in the malware category are unique compared to the benign dataset, and thus features extracted from the remnant of in-memory allocated objects can be utilized for robust Android malware classification algorithm.

Skip Supplemental Material Section

Supplemental Material

codas06p.mp4

mp4

15.8 MB

References

  1. Smartphone Market Share. Accessed: Apr. 30, 2020. [Online]. Available: https://www.idc.com/promo/smartphone-market-share/osGoogle ScholarGoogle Scholar
  2. G. Data Software, "G DATA Mobile Malware Report 2019: New high for malicious Android apps", [Online]. Available: https://www.gdata-software.com/news/gdata-mobile-malware-report-2019-new-high-for-malicious-android-appsGoogle ScholarGoogle Scholar
  3. A. Ali-Gombe, S. Sudhakaran, A. Case, and G. G. Richard, "DroidScraper: a tool for Android in-memory object recovery and reconstruction," in Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses, pp. 547--559, Beijing, China, October 2019.Google ScholarGoogle Scholar
  4. A. Ali-Gombe, A. Tambaoan, A. Gurfolino, and G. G. Richard, "App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts, "In Annual Computer Security Applications Conference (ACSAC), Austin, USA, December 2020.Google ScholarGoogle Scholar
  5. Volatility Foundation. 2017. Volatility Command Reference. https://github.com/volatilityfoundation/volatility/wiki/Command-Reference. Available:accessed 21-March 2018].Google ScholarGoogle Scholar
  6. Google, 2016. Rekall. https://github.com/google/rekall.Google ScholarGoogle Scholar
  7. Michal Zalewski. 2003. Memfetch. https://github.com/citypw/lcamtuf-memfetch [Online; accessed 17-March 2018].Google ScholarGoogle Scholar

Index Terms

  1. Object Allocation Pattern as an Indicator for Maliciousness - An Exploratory Analysis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CODASPY '21: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy
      April 2021
      348 pages
      ISBN:9781450381437
      DOI:10.1145/3422337

      Copyright © 2021 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 April 2021

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate149of789submissions,19%

      Upcoming Conference

      CODASPY '24
    • Article Metrics

      • Downloads (Last 12 months)12
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader