CTF-All-In-One

8.20 DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware

paper

What is your take-away message from this paper

The authors present DroidAnalytics, an Android malware analytic system for malware collection, signature generation, information retrieval, and malware association based on similarity score. Furthermore, DroidAnalytics can efficiently detect zero-day repackaged malware.

What are motivations for this work

An effective analytic system needs to address the following questions:

What is the proposed solution

img

The system consists these modules:

img

img

What is the work’s evaluation of the proposed solution

We conduct three experiments and show how analysts can study malware, carry out similarity measurement between applications, as well as perform class association among 150,368 mobile applications in the database.

we have used DroidAnalyt- ics to detect 2,494 malware samples from 102 families, with 342 zero-day malware samples from six different families.

What is your analysis of the identified problem, idea and evaluation

DroidAnalytics’s signature generation is based on the following observation: For any functional application, it needs to invoke various Android API calls, and Android API calls sequence within a methods is difficult to modify.

Traditional Hash vs Three-level Signature:

What are the contributions

The authors present the design and implementation of DroidAnalytics:

What are future directions for this research

What questions are you left with