skip to main content
10.1145/2307636.2307663acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

RiskRanker: scalable and accurate zero-day android malware detection

Authors Info & Claims
Published:25 June 2012Publication History

ABSTRACT

Smartphone sales have recently experienced explosive growth. Their popularity also encourages malware authors to penetrate various mobile marketplaces with malicious applications (or apps). These malicious apps hide in the sheer number of other normal apps, which makes their detection challenging. Existing mobile anti-virus software are inadequate in their reactive nature by relying on known malware samples for signature extraction. In this paper, we propose a proactive scheme to spot zero-day Android malware. Without relying on malware samples and their signatures, our scheme is motivated to assess potential security risks posed by these untrusted apps. Specifically, we have developed an automated system called RiskRanker to scalably analyze whether a particular app exhibits dangerous behavior (e.g., launching a root exploit or sending background SMS messages). The output is then used to produce a prioritized list of reduced apps that merit further investigation. When applied to examine 118,318 total apps collected from various Android markets over September and October 2011, our system takes less than four days to process all of them and effectively reports 3281 risky apps. Among these reported apps, we successfully uncovered 718 malware samples (in 29 families) and 322 of them are zero-day (in 11 families). These results demonstrate the efficacy and scalability of RiskRanker to police Android markets of all stripes.

References

  1. 260,000 Android users infected with malware. http://www.infosecurity-magazine.com/view/16526/260000-android-users-infected-with-malware/.Google ScholarGoogle Scholar
  2. adb trickery#2. http://c-skills.blogspot.com/2011/01/adb-trickery-again.html.Google ScholarGoogle Scholar
  3. Adobe AIR 3. http://www.adobe.com/products/air.html.Google ScholarGoogle Scholar
  4. AdTouch. http://www.adtouchnetwork.com/adtouch/sdk/SDK.html.Google ScholarGoogle Scholar
  5. An Analysis of the AnserverBot Trojan. http://www.csc.ncsu.edu/faculty/jiang/pubs/AnserverBot_Analysis.pdf.Google ScholarGoogle Scholar
  6. Android and Security. http://googlemobile.blogspot.com/2012/02/android-and-security.html.Google ScholarGoogle Scholar
  7. Android Market Statistic. http://www.androlib.com/appstats.aspx.Google ScholarGoogle Scholar
  8. android trickery. http://c-skills.blogspot.com/2010/07/android-trickery.html.Google ScholarGoogle Scholar
  9. Asroot. http://milw0rm.com/sploits/android-root-20090816.tar.gz.Google ScholarGoogle Scholar
  10. Contagio mobile malware mini dump. http://contagiominidump.blogspot.com/.Google ScholarGoogle Scholar
  11. DexClassLoader. http://developer.android.com/reference/dalvik/system/DexClassLoader.html.Google ScholarGoogle Scholar
  12. Droid2. http://c-skills.blogspot.com/2010/08/droid2.html.Google ScholarGoogle Scholar
  13. Gartner Says Sales of Mobile Devices Grew 5.6 Percent in Third Quarter of 2011; Smartphone Sales Increased 42 Percent. http://www.gartner.com/it/page.jsp?id=1848514.Google ScholarGoogle Scholar
  14. GingerMaster: First Android Malware Utilizing a Root Exploit on Android 2.3 (Gingerbread). http://www.csc.ncsu.edu/faculty/jiang/GingerMaster/.Google ScholarGoogle Scholar
  15. iBuildApp. http://ibuildapp.com/.Google ScholarGoogle Scholar
  16. LeNa (Legacy Native) Teardown_Lookout Mobile Security. http://blog.mylookout.com/wp-content/uploads/2011/10/LeNa-Legacy-Native-Teardown_Lookout-Mobile-Security1.pdf.Google ScholarGoogle Scholar
  17. Manifest.permission_group definitions. http://developer.android.com/reference/android/Manifest.permission_group.html.Google ScholarGoogle Scholar
  18. New DroidKungFu Variant - DroidKungFuSapp - Emerges! http://www.csc.ncsu.edu/faculty/jiang/DroidKungFuSapp/.Google ScholarGoogle Scholar
  19. ProGuard. http://developer.android.com/guide/developing/tools/proguard.html.Google ScholarGoogle Scholar
  20. Revolutionary - zergRush local root 2.2/2.3. http://forum.xda-developers.com/showthread.php?t=1296916.Google ScholarGoogle Scholar
  21. Security Alert: AnserverBot, New Sophisticated Android Bot Found in Alternative Android Markets. http://www.csc.ncsu.edu/faculty/jiang/AnserverBot/.Google ScholarGoogle Scholar
  22. Security Alert: Geinimi, Sophisticated New Android Trojan Found in Wild. http://blog.mylookout.com/2010/12/geinimi_trojan/.Google ScholarGoogle Scholar
  23. Security Alert: New Android Malware - DroidCoupon - Found in Alternative Android Markets. http://www.csc.ncsu.edu/faculty/jiang/DroidCoupon/.Google ScholarGoogle Scholar
  24. Security Alert: New DroidKungFu Variant - AGAIN! - Found in Alternative Android Markets. http://www.csc.ncsu.edu/faculty/jiang/DroidKungFu3/.Google ScholarGoogle Scholar
  25. Security Alert: New DroidKungFu Variants Found in Alternative Chinese Android Markets. http://www.csc.ncsu.edu/faculty/jiang/DroidKungFu2/.Google ScholarGoogle Scholar
  26. Security Alert: New Sophisticated Android Malware DroidKungFu Found in Alternative Chinese App Markets. http://www.csc.ncsu.edu/faculty/jiang/DroidKungFu.html.Google ScholarGoogle Scholar
  27. Security Alert: New Stealthy Android Spyware - Plankton - Found in Official Android Market. http://www.csc.ncsu.edu/faculty/jiang/Plankton/.Google ScholarGoogle Scholar
  28. Smartphone shipments tripled since '08. Dumb phones are flat. http://tech.fortune.cnn.com/2011/11/01/smartphone-shipments-tripled-since-08-dumb-phones-are-flat/.Google ScholarGoogle Scholar
  29. yummy yummy, GingerBreak! http://c-skills.blogspot.com/2011/04/yummy-yummy-gingerbreak.html.Google ScholarGoogle Scholar
  30. Zimperlich sources. http://c-skills.blogspot.com/2011/02/zimperlich-sources.html.Google ScholarGoogle Scholar
  31. Andrus, J., Dall, C., Van't Hof, A., Laadan, O., and Nieh, J. Cells: A Virtual Mobile Smartphone Architecture. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (2011), SOSP '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Beresford, A. R., Rice, A., Skehin, N., and Sohan, R. MockDroid: Trading Privacy for Application Functionality on Smartphones. In Proceedings of the 12th International Workshop on Mobile Computing System and Applications (2011), HotMobile '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Bugiel, S., Davi, L., Dmitrienko, A., Fischer, T., Sadeghi, A.-R., and Shastry, B. Towards Taming Privilege-Escalation Attacks on Android. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (2012), NDSS '12.Google ScholarGoogle Scholar
  34. Chin, E., Felt, A. P., Greenwood, K., and Wagner, D. Analyzing Inter-Application Communication in Android. In Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services (2011), MobiSys 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Davi, L., Dmitrienko, A., Egele, M., Fischer, T., Holz, T., Hund, R., Nurnberger, S., and Sadeghi, A.-R. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (2012), NDSS '12.Google ScholarGoogle Scholar
  36. Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., and Wallach, D. S. QUIRE: Lightweight Provenance for Smart Phone Operating Systems. In Proceedings of the 20th USENIX Security Symposium (2011), USENIX Security '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Egele, M., Kruegel, C., Kirda, E., and Vigna, G. PiOS: Detecting Privacy Leaks in iOS Applications. In Proceedings of the 18th Annual Symposium on Network and Distributed System Security (2011), NDSS '11.Google ScholarGoogle Scholar
  38. Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (2010), USENIX OSDI '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Enck, W., Octeau, D., McDaniel, P., and Chaudhuri, S. A Study of Android Application Security. In Proceedings of the 20th USENIX Security Symposium (2011), USENIX Security '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Enck, W., Ongtang, M., and McDaniel, P. On Lightweight Mobile Phone Application Certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security (2009), CCS '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Felt, A. P., Chin, E., Hanna, S., Song, D., and Wagner, D. Android Permissions Demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security (2011), CCS '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Felt, A. P., Wang, H. J., Moshchuk, A., Hanna, S., and Chin, E. Permission Re-Delegation: Attacks and Defenses. In Proceedings of the 20th USENIX Security Symposium (2011), USENIX Security '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Grace, M., Zhou, W., Jiang, X., and Sadeghi, A.-R. Unsafe Exposure Analysis of Mobile In-App Advertisements. In Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks (2012), ACM WiSec '12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Grace, M., Zhou, Y., Wang, Z., and Jiang, X. Systematic Detection of Capability Leaks in Stock Android Smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (2012), NDSS '12.Google ScholarGoogle Scholar
  45. Hardy, N. The Confused Deputy: (or why capabilities might have been invented). ACM SIGOPS Operating Systems Review 22 (October 1998). Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Hornyack, P., Han, S., Jung, J., Schechter, S., and Wetherall, D. These Aren't the Droids You're Looking For: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security (2011), CCS '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Lange, M., Liebergeld, S., Lackorzynski, A., Warg, A., and Peter, M. L4Android: A Generic Operating System Framework for Secure Smartphones. In Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices (2011), CCS-SPSM '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Nauman, M., Khan, S., and Zhang, X. Apex: Extending Android Permission Model and Enforcement with User-Defined Runtime Constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (2010), ASIACCS '10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Ongtang, M., McLaughlin, S., Enck, W., and McDaniel, P. Semantically Rich Application-Centric Security in Android. In Proceedings of the 2009 Annual Computer Security Applications Conference (2009), ACSAC '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Porter Felt, A., Finifter, M., Chin, E., Hanna, S., and Wagner, D. A Survey of Mobile Malware In The Wild. In Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices (2011), CCS-SPSM '11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Schrittwieser, S., Fruhwirt, P., Kieseberg, P., Leithner, M., Mulazzani, M., Huber, M., and Weippl, E. Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (2012), NDSS '12.Google ScholarGoogle Scholar
  52. Wang, H. J., Guo, C., Simon, D. R., and Zugenmaier, A. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In Proceedings of the ACM SIGCOMM 2004 Conference (2004), ACM SIGCOMM '04. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Wang, Z., Jiang, X., Cui, W., Wang, X., and Grace, M. ReFormat: Automatic Reverse Engineering of Encrypted Messages. In Proceedings of the 14th European Symposium on Research in Computer Security (September 2009), ESORICS '09. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Zhou, W., Zhou, Y., Jiang, X., and Ning, P. DroidMOSS: Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces. In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (2012), CODASPY '12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Zhou, Y., and Jiang, X. Dissecting Android Malware: Characterization and Evolution. In Proceedings of the 33rd IEEE Symposium on Security and Privacy (2012), IEEE Oakland '12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Zhou, Y., Wang, Z., Zhou, W., and Jiang, X. Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (2012), NDSS '12.Google ScholarGoogle Scholar
  57. Zhou, Y., Zhang, X., Jiang, X., and Freeh, V. W. Taming Information-Stealing Smartphone Applications (on Android). In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (2011), TRUST '11. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. RiskRanker: scalable and accurate zero-day android malware detection

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        MobiSys '12: Proceedings of the 10th international conference on Mobile systems, applications, and services
        June 2012
        548 pages
        ISBN:9781450313018
        DOI:10.1145/2307636

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 June 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate274of1,679submissions,16%

        Upcoming Conference

        MOBISYS '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader