CTF-All-In-One

8.16 DynaLog: An automated dynamic analysis framework for characterizing Android applications

paper

What is your take-away message from this paper

The authors presented DynaLog, a framework that enable automated mass dynamic analysis of applications in order to characterize them for analysis and potential detection of malicious behaviour.

What are motivations for this work

Malware

Current Methods’ Limitations

What is the proposed solution

DynaLog has several components:

  1. Emulator-based analysis sandbox
  2. APK instrumentation module
  3. behaviour/features logging and extraction
  4. Application trigger/exerciser
  5. Log parsing and processing scripts

img

Dynamic analysis tool (DroidBox capabilities)

Problems with Sandbox performance

Extended Sandbox to overcome these issues by

What is the work’s evaluation of the proposed solution

Dataset

We used 1226 real malware samples from 49 families of the Malgenome Project malware dataset. Furthermore, a set of 1000 internally vetted benign APKs from McAfee Labs were utilized.

Experiment 1: evaluating high level behaviour features

img

Experiment 2: evaluating extended features and sandbox enhancements within DynaLog

img

img

Results

img

What is your analysis of the identified problem, idea and evaluation

What are the contributions

What are future directions for this research

For future work we intend to develop and couple classification engines that can utilize the extensive features of DynaLog for accurate identification of malware samples. Furthermore, we intend to enhance the framework to improve its robustness against anti-analysis techniques employed by some malware whilst also incorporating new feature sets to improve the overall analysis and detection capabilities.

What questions are you left with