Abstract
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware variants even by attackers with entry-level programming skills. Such obfuscation techniques can evade the signature-based mechanism implemented in current antimalware technology. This paper presents the results of a study that examined how automated obfuscation techniques affect malicious and benign applications by two widely used malware detection approaches, namely static and dynamic analyses. The research explored 5000 samples of malware and benign programs and evaluated the impact of automated obfuscation on Android applications. The experimental results indicated that (1) up to 73% of the reviewed applications “survived” the automated obfuscation; (2) automated obfuscation reduced the detection ratio to 65–85% depending on the obfuscation method used. These findings call for a more active use of advanced malware detection methods in commonly used antivirus platforms.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference32 articles.
1. Mobile Operating System Market Share Worldwidehttps://gs.statcounter.com/os-market-share/mobile/worldwide
2. Different Obfuscation Techniques for Code Protection
3. Sandmark—A Tool for Software Protection Research;Collberg,2003
4. Obfuscating Android Apps: Do You Know Your Choices for Protection?https://proandroiddev.com/obfuscation-is-important-do-you-know-your-options-30b3ef396dfe
5. Obfuscapk: An open-source black-box obfuscation tool for Android apps
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Machine Learning Based Approaches For Android Malware Detection using Hybrid Feature Analysis;2024 6th International Conference on Computing and Informatics (ICCI);2024-03-06
2. A Comprehensive Analysis of Software Obfuscation Techniques;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2023-05-15