File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Happer: Unpacking Android Apps via a Hardware-Assisted Approach

TitleHapper: Unpacking Android Apps via a Hardware-Assisted Approach
Authors
KeywordsAndroid-Packer
ARM-ETM
Android-App-Analysis
Issue Date2021
PublisherIEEE. The Journal's web site is located at https://ieeexplore.ieee.org/xpl/conhome/1000646/all-proceedings
Citation
The 42nd IEEE Symposium on Security and Privacy (IEEE S&P 2021), San Francisco, CA, USA, 24-27 May 2021, p. 1641-1658 How to Cite?
AbstractMalware authors are abusing packers (or runtime-based obfuscators) to protect malicious apps from being analyzed. Although many unpacking tools have been proposed, they can be easily impeded by the anti-analysis methods adopted by the packers, and they fail to effectively collect the hidden Dex data due to the evolving protection strategies of packers. Consequently, many packing behaviors are unknown to analysts and packed malware can circumvent the inspection. To fill the gap, in this paper, we propose a novel hardware-assisted approach that first monitors the packing behaviors and then selects the proper approach to unpack the packed apps. Moreover, we develop a prototype named Happerwith a domain-specific language named behavior description language (BDL) for the ease of extending Happerafter tackling several technical challenges. We conduct extensive experiments with 12 commercial Android packers and more than 24k Android apps to evaluate Happer. The results show that Happerobserved 27 packing behaviors, 17 of which have not been elaborated by previous studies. Based on the observed packing behaviors, Happeradopted proper approaches to collect all the hidden Dex data and assembled them to valid Dex files.
Persistent Identifierhttp://hdl.handle.net/10722/306177
ISSN
2020 SCImago Journal Rankings: 2.407

 

DC FieldValueLanguage
dc.contributor.authorXue, L-
dc.contributor.authorZhou, H-
dc.contributor.authorLuo, X-
dc.contributor.authorZhou, Y-
dc.contributor.authorShi, Y-
dc.contributor.authorGu, G-
dc.contributor.authorZhang, F-
dc.contributor.authorAu, AMH-
dc.date.accessioned2021-10-20T10:19:53Z-
dc.date.available2021-10-20T10:19:53Z-
dc.date.issued2021-
dc.identifier.citationThe 42nd IEEE Symposium on Security and Privacy (IEEE S&P 2021), San Francisco, CA, USA, 24-27 May 2021, p. 1641-1658-
dc.identifier.issn1081-6011-
dc.identifier.urihttp://hdl.handle.net/10722/306177-
dc.description.abstractMalware authors are abusing packers (or runtime-based obfuscators) to protect malicious apps from being analyzed. Although many unpacking tools have been proposed, they can be easily impeded by the anti-analysis methods adopted by the packers, and they fail to effectively collect the hidden Dex data due to the evolving protection strategies of packers. Consequently, many packing behaviors are unknown to analysts and packed malware can circumvent the inspection. To fill the gap, in this paper, we propose a novel hardware-assisted approach that first monitors the packing behaviors and then selects the proper approach to unpack the packed apps. Moreover, we develop a prototype named Happerwith a domain-specific language named behavior description language (BDL) for the ease of extending Happerafter tackling several technical challenges. We conduct extensive experiments with 12 commercial Android packers and more than 24k Android apps to evaluate Happer. The results show that Happerobserved 27 packing behaviors, 17 of which have not been elaborated by previous studies. Based on the observed packing behaviors, Happeradopted proper approaches to collect all the hidden Dex data and assembled them to valid Dex files.-
dc.languageeng-
dc.publisherIEEE. The Journal's web site is located at https://ieeexplore.ieee.org/xpl/conhome/1000646/all-proceedings-
dc.relation.ispartofThe 42nd IEEE Symposium on Security and Privacy (IEEE S&P 2021)-
dc.rightsIEEE Symposium on Security and Privacy Proceedings. Copyright © IEEE.-
dc.rights©2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.-
dc.subjectAndroid-Packer-
dc.subjectARM-ETM-
dc.subjectAndroid-App-Analysis-
dc.titleHapper: Unpacking Android Apps via a Hardware-Assisted Approach-
dc.typeConference_Paper-
dc.identifier.emailAu, AMH: manhoau@hku.hk-
dc.identifier.authorityAu, AMH=rp02638-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/SP40001.2021.00105-
dc.identifier.scopuseid_2-s2.0-85114659378-
dc.identifier.hkuros327846-
dc.identifier.spage1641-
dc.identifier.epage1658-
dc.publisher.placeUnited States-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats