File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS

TitleFollowing Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS
Authors
Issue Date2016
Citation
Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016, 2016, p. 357-376 How to Cite?
AbstractIt is reported recently that legitimate libraries are repackaged for propagating malware. An in-depth analysis of such potentially-harmful libraries (PhaLibs), however, has never been done before, due to the challenges in identifying those libraries whose code can be unavailable online (e.g., removed from the public repositories, spreading underground, etc.). Particularly, for an iOS app, the library it integrates cannot be trivially recovered from its binary code and cannot be analyzed by any publicly available anti-virus (AV) systems. In this paper, we report the first systematic study on PhaLibs across Android and iOS, based upon a key observation that many iOS libraries have Android versions that can potentially be used to understand their behaviors and the relations between the libraries on both sides. To this end, we utilize a methodology that first clusters similar packages from a large number of popular Android apps to identify libraries, and strategically analyze them using AV systems to find PhaLibs. Those libraries are then used to search for their iOS counterparts within Apple apps based upon the invariant features shared cross platforms. On each discovered iOS PhaLib, our approach further identifies its suspicious behaviors that also appear on its Android version and uses the AV system on the Android side to confirm that it is indeed potentially harmful. Running our methodology on 1.3 million Android apps and 140,000 popular iOS apps downloaded from 8 markets, we discovered 117 PhaLibs with 1008 variations on Android and 23 PhaLibs with 706 variations on iOS. Altogether, the Android PhaLibs is found to infect 6.84% of Google Play apps and the iOS libraries are embedded within thousands of iOS apps, 2.94% among those from the official Apple App Store. Looking into the behaviors of the PhaLibs, not only do we discover the recently reported suspicious iOS libraries such as mobiSage, but also their Android counterparts and 6 other back-door libraries never known before. Those libraries are found to contain risky behaviors such as reading from their host apps' keychain, stealthily recording audio and video and even attempting to make phone calls. Our research shows that most Android-side harmful behaviors have been preserved on their corresponding iOS libraries, and further identifies new evidence about libraries repackaging for harmful code propagations on both sides.
Persistent Identifierhttp://hdl.handle.net/10722/350217

 

DC FieldValueLanguage
dc.contributor.authorChen, Kai-
dc.contributor.authorWang, Xueqiang-
dc.contributor.authorChen, Yi-
dc.contributor.authorWang, Peng-
dc.contributor.authorLee, Yeonjoon-
dc.contributor.authorWang, Xiaofeng-
dc.contributor.authorMa, Bin-
dc.contributor.authorWang, Aohui-
dc.contributor.authorZhang, Yingjun-
dc.contributor.authorZou, Wei-
dc.date.accessioned2024-10-21T04:35:08Z-
dc.date.available2024-10-21T04:35:08Z-
dc.date.issued2016-
dc.identifier.citationProceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016, 2016, p. 357-376-
dc.identifier.urihttp://hdl.handle.net/10722/350217-
dc.description.abstractIt is reported recently that legitimate libraries are repackaged for propagating malware. An in-depth analysis of such potentially-harmful libraries (PhaLibs), however, has never been done before, due to the challenges in identifying those libraries whose code can be unavailable online (e.g., removed from the public repositories, spreading underground, etc.). Particularly, for an iOS app, the library it integrates cannot be trivially recovered from its binary code and cannot be analyzed by any publicly available anti-virus (AV) systems. In this paper, we report the first systematic study on PhaLibs across Android and iOS, based upon a key observation that many iOS libraries have Android versions that can potentially be used to understand their behaviors and the relations between the libraries on both sides. To this end, we utilize a methodology that first clusters similar packages from a large number of popular Android apps to identify libraries, and strategically analyze them using AV systems to find PhaLibs. Those libraries are then used to search for their iOS counterparts within Apple apps based upon the invariant features shared cross platforms. On each discovered iOS PhaLib, our approach further identifies its suspicious behaviors that also appear on its Android version and uses the AV system on the Android side to confirm that it is indeed potentially harmful. Running our methodology on 1.3 million Android apps and 140,000 popular iOS apps downloaded from 8 markets, we discovered 117 PhaLibs with 1008 variations on Android and 23 PhaLibs with 706 variations on iOS. Altogether, the Android PhaLibs is found to infect 6.84% of Google Play apps and the iOS libraries are embedded within thousands of iOS apps, 2.94% among those from the official Apple App Store. Looking into the behaviors of the PhaLibs, not only do we discover the recently reported suspicious iOS libraries such as mobiSage, but also their Android counterparts and 6 other back-door libraries never known before. Those libraries are found to contain risky behaviors such as reading from their host apps' keychain, stealthily recording audio and video and even attempting to make phone calls. Our research shows that most Android-side harmful behaviors have been preserved on their corresponding iOS libraries, and further identifies new evidence about libraries repackaging for harmful code propagations on both sides.-
dc.languageeng-
dc.relation.ispartofProceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016-
dc.titleFollowing Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/SP.2016.29-
dc.identifier.scopuseid_2-s2.0-84987680533-
dc.identifier.spage357-
dc.identifier.epage376-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats