SlideShare una empresa de Scribd logo
1 de 47
Descargar para leer sin conexión
SESSION ID:
#RSAC
Christopher Kruegel
Finding Triggered Malice in
Android Apps
MBS-W04
Chief Scientist
Lastline, Inc.
#RSAC
Who am I?
2
Professor in Computer Science at UC Santa Barbara
many systems security papers in academic conferences
started malware research in about 2004
built and released practical systems (Anubis, Wepawet, …)
Co-founder and Chief Scientist at Lastline, Inc.
Lastline offers protection against zero-day threats and advanced
malware
effort to commercialize our research
#RSAC
What are we talking about?
Android applications (apps) and mobile malware
Power of static code analysis in the context of Android apps
Tricky malware that uses triggers to evade detection
Triggers and triggered malware in the wild
3
#RSAC
Mobile devices (apps) dominate …
4
#RSAC
… and Android is leading the pack
5
#RSAC
Android Malware on the rise!
Where are the differences to desktop applications?
centralized control
vet applications before they enter store
can remotely remove installed applications
carriers might have more complete picture of users and traffic
apps are much easier to analyze statically
use of Dalvik bytecode instead of x86
interesting GUI issues
6
#RSAC
Static Analysis for Android Apps
Precise, scalable static analysis of Android apps
Analysis over bytecode
Minimal a priori assumptions regarding app design
Cannot ignore difficult cases and adversarial behavior
Do not consider apps in isolation (intents, user interaction, …)
Scalability from the start
7
#RSAC
Dalvik Static Analysis
Front-end
APK unpacker
DEX parser
Androguard, dexlib
produces custom IR
Back-end
operates on IR
points-to, CFA, backwards slicing,…
trigger analysis
8
#RSAC
Static Analysis
9
Tracking data flows is at the core of our analysis
Analysis must handle not only data flows, but also values
apps request permissions, but they are very coarse-grained
string, value-range analysis
#RSAC
Static Analysis
10
Analysis must handle user interaction, activities, and intents
otherwise, data flows can be “broken”
Analysis must handle complex data structures
standard collection classes
key-value stores for intent parameters
Whole system analysis
#RSAC
String Analysis
11
Robust and precise string modeling is a fundamental capability
many interesting flows are parameterized by strings
e.g., * ⇝ loadUrl
symbolic strings are interesting and problematic
String constraint solver tailored to common string operations in
Android applications
append, substring, reverse, charAt, delete, …
STP as the backend SMT solver
#RSAC
Implicit Flow Reconstruction
Android applications written as collections of event-driven or
asynchronous components
Activity, Service, BroadcastReceiver
AsyncTask, Thread, Runnable, Callable
requestLocationUpdates ⇝ onLocationChanged
takePicture ⇝ onPictureTaken
Analyzer models implicit flows through framework
linking explicit handler registrations is straightforward
implicit flow recovery through dynamic analysis
12
#RSAC
Implicit Flow Recovery
13
Identify previously unknown implicit flows
increase coverage while preserving data flow precision
Enabled by combination of instrumentation and Clicker
tracing code injected, dynamic analysis driven by Clicker
records exit points from application code
records entry points into framework
trace events binned by thread
#RSAC
Implicit Flow Recovery
14
Several classes of flows discovered
explicit callback registration
registration of callback groups
“implicit” registration
#RSAC
(Some) Interesting Applications
15
Detection of triggered malware
Finding GUI confusion attacks
Finding dynamic code loading vulnerabilities
Locate incorrect use of cryptography
#RSAC
(Some) Interesting Applications
16
Detection of triggered malware
Finding GUI confusion attacks
Finding dynamic code loading vulnerabilities
Locate incorrect use of cryptography
We focus on
this one today!
#RSAC
Evasion and Triggers
Malware authors are not sleeping
they got the news that sandboxes are all the rage now
since the code is executed, malware authors have options ..
Evasion
develop code that exhibits no malicious
behavior in sandbox, but that infects the
intended target
17
#RSAC
Evasion and Triggers
18
One key evasive technique relies on checking for specific
values in the environment or inputs – these checks are
called triggers
Other evasive techniques used against sandbox
technology
exploit limited context
avoid analysis (sleep, stalling)
avoid analysis (move to kernel, for example, rootkits)
#RSAC
Trigger Analysis
Data flow captures many important classes of malicious behaviors
however, some behaviors are difficult to reason about purely through
data flow
1. Analysis to find interesting checks that exhibit characteristics of
triggering behavior
adversaries often want to predicate their attack based on environmental
conditions
analysis identifies usage of predicates based on environmental data
(e.g., location, time, SMS)
2. Then determine whether these checks guard “interesting”
behaviors
19
#RSAC
Find Interesting Checks (1/2)
Find conditionals that depend on interesting input
location, date, time, SMS input …
Use data flow analysis to determine where interesting input
flows to, and what operations the program performs on these
inputs
Propagate constraints on input values along program paths
we call these path predicates
20
#RSAC
Find Interesting Checks (2/2)
Check for characteristics of triggering behavior
checks might be very specific
do the predicates significantly constrain the value domain?
are there many checks applied to an input?
program performs unusual operations on certain inputs
do we see unusual operations / operands for certain inputs?
These are heuristics, and we need to know something about the
numbers and types of checks that benign programs perform on
certain types of input
21
#RSAC
Find Interesting Checks
22
Example – Malicious application
void onCreate(Bundle savedInstanceState) {
currentTime = new Time(Time.getCurrentTimezone());
currentTime.setToNow();
newSiteAvailable =
(currentTime.month > 4 && currentTime.month < 8) &&
currentTime.year >= 2013;
How unusual is this?
#RSAC
Find Interesting Checks
23
Analysis of 3K apps yields
Checks in malicious app yield a score of 3.7
#RSAC
Find Checks That Guard Behavior
24
Analysis can point human to suspicious checks
support manual review
Maybe we can do better
check whether trigger-like check guards sensitive operation
Easier approach
check for sensitive operations directly on path guarded by check
More complete approach
check whether check can influence sensitive operation anywhere in
the program
#RSAC
Find Checks That Guard Behavior
25
boolean onOptionsItemSelected(MenuItem item) {
String updateUrl = "";
if(newSiteAvailable) {
url = "http://www.evil.com";
updateUrl = getUpdatedUrl();
startIntent(url, updateUrl);
else {
startIntent(url);
}
#RSAC
What did we find?
Dataset of ~10K apps from the Google market
Collection of triggered malware
DARPA apps developed by Red Team
Holy Colbert Trojan (backdoor in legitimate app)
Zitmo (Zeus-In-The-MOile)
RCSAndroid (Hacking Team)
26
#RSAC
Google Market
Dataset of ~10K apps from the Google market
27
Domain # Apps # Apps w/
Checks
# Suspicious
Checks
# Guarded
Behavior
# Post-
processed
Time 4,950 1,026 302 30 10
Location 3,430 137 71 23 8
SMS 1,138 223 89 64 17
#RSAC
Processing Time
28
#RSAC
Time Triggers
Benign triggers
to check for updates
to implement countdown functionality
29
#RSAC
Time Triggers
30
#RSAC
Location Triggers
Benign triggers
based on user-defined areas
one interesting trigger for specific Japanese train station
31
#RSAC
Location Triggers
32
#RSAC
SMS Triggers
Mostly benign triggers
apps check for sender, sender’s phone, or content to check if they need
to process SMS for regular app functionality
Two suspicious examples found
tw.nicky.LockMyPhoneTrial (RemoteLock)
com.innovationdroid.myremotephone
(MyRemotePhone)
33
#RSAC
SMS Triggers
RemoteLock (removed ~2013 from PlayStore)
checks whether the incoming SMS matches with a long, hardcoded
string (“adf…yhytdfsw”). If that is the case, the application unlocks the
phone!
MyRemotePhone (still available on PlayStore)
checks whether the incoming SMS contains the following two strings:
MPS: and gps (now mrp: gps). If that is the case, the application
automatically sends an SMS to the original sender containing the
current GPS coordinates!
34
#RSAC
Malware Samples
DARPA Red Team apps
deliberately developed to bypass dynamic analysis
5 time triggers (hardcoded dates and times)
1 location trigger [ based on Location.distanceBetween() ]
5 SMS triggers (contents of messages)
malicious activity were data leaks and integrity violations
35
#RSAC
Malware Samples
Zitmo
checks for content in SMS to steal mTANs for banks
SMS used to implement command and control
Holy Colbert
time trigger based on SimpleDateFormat API
36
#RSAC
Malware Samples
RCSAndroid
remote control app written by HackingTeam
SMS-based trigger (comparison with values from a file)
behaviors range from data leakage (send conversations, device
information) to capture of screenshots and voice calls
37
#RSAC
RCSAndroid
SMS-based check (comparison with values from a file)
38
#RSAC
RCSAndroid
Based on the checks, an action is triggered …
39
#RSAC
(Some) Interesting Applications
40
Detection of triggered malware
Finding GUI confusion attacks
Finding dynamic code loading vulnerabilities
Locate incorrect use of cryptography
#RSAC
Dynamic Code Loading
Apps can load code dynamically at runtime
download code from the Internet or local files
various ways (DexClassLoader, CreatePackageContext, …)
41
#RSAC
Dynamic Code Loading Vulnerabilities
Insecure downloads
load code over HTTP
Unprotected storage
downloaded code is stored in location accessible to other apps
Improper use of package names
load code from other apps, specifying only package names
42
#RSAC
Dynamic Code Loading Vulnerabilities
Top 50 free apps around end of 2013
43
#RSAC
Finding Incorrect Use of Crypto
Finding apps that use broken crypto
developers are not security experts
AES/ECBAES/CBCPlaintext
44
#RSAC
Finding Incorrect Use of Crypto
Almost 12K apps that use crypto
31% use known key
65% use ECB
16% use known IV for CBC
45
#RSAC
Lessons Learned
46
Understand that mobile threats are real
Google Bouncer not enough
Understand that fighting mobile malware is fundamentally
different than fighting Windows malware
ask your vendor how they detect mobile malware
demand certain protection guarantees
Vulnerabilities are real and widespread
how to manage app installation, patching, … ?
#RSAC
Conclusions
47
Smartphones and apps increasingly popular and
important
Interesting differences between apps and traditional
desktop programs allow for important security
improvements
easier static analysis
Using static analysis to identify triggers and
environmental checks in malicious Android apps

Más contenido relacionado

La actualidad más candente

Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014viaForensics
 
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016grecsl
 
Bypass Security Checking with Frida
Bypass Security Checking with FridaBypass Security Checking with Frida
Bypass Security Checking with FridaSatria Ady Pradana
 
BlueHat v18 || A turla gift - popping calc.exe by sending an email
BlueHat v18 || A turla gift - popping calc.exe by sending an emailBlueHat v18 || A turla gift - popping calc.exe by sending an email
BlueHat v18 || A turla gift - popping calc.exe by sending an emailBlueHat Security Conference
 
Automatic tool for static analysis
Automatic tool for static analysisAutomatic tool for static analysis
Automatic tool for static analysisChong-Kuan Chen
 
Tracking vulnerable JARs
Tracking vulnerable JARsTracking vulnerable JARs
Tracking vulnerable JARsDavid Jorm
 
The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)Javier Junquera
 
Securing your web applications a pragmatic approach
Securing your web applications a pragmatic approachSecuring your web applications a pragmatic approach
Securing your web applications a pragmatic approachAntonio Parata
 
OpenDaylight Brisbane User Group - OpenDaylight Security
OpenDaylight Brisbane User Group - OpenDaylight SecurityOpenDaylight Brisbane User Group - OpenDaylight Security
OpenDaylight Brisbane User Group - OpenDaylight SecurityDavid Jorm
 
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...Priyanka Aash
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...idsecconf
 
Extending Zeek for ICS Defense
Extending Zeek for ICS DefenseExtending Zeek for ICS Defense
Extending Zeek for ICS DefenseJames Dickenson
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CanSecWest
 
Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...
Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...
Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...CODE BLUE
 
Building world-class security response and secure development processes
Building world-class security response and secure development processesBuilding world-class security response and secure development processes
Building world-class security response and secure development processesDavid Jorm
 
The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...Priyanka Aash
 
AusCERT 2016: CVE and alternatives
AusCERT 2016: CVE and alternativesAusCERT 2016: CVE and alternatives
AusCERT 2016: CVE and alternativesDavid Jorm
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP
 
Kl 031.30 eng_class_setup_guide_1.2
Kl 031.30 eng_class_setup_guide_1.2Kl 031.30 eng_class_setup_guide_1.2
Kl 031.30 eng_class_setup_guide_1.2Freddy Ortiz
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisChong-Kuan Chen
 

La actualidad más candente (20)

Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
Hacking ios-on-the-run-using-cycript-viaforensics-rsa-conference-2014
 
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
Deploying a Shadow Threat Intel Capability at Thotcon on May 6, 2016
 
Bypass Security Checking with Frida
Bypass Security Checking with FridaBypass Security Checking with Frida
Bypass Security Checking with Frida
 
BlueHat v18 || A turla gift - popping calc.exe by sending an email
BlueHat v18 || A turla gift - popping calc.exe by sending an emailBlueHat v18 || A turla gift - popping calc.exe by sending an email
BlueHat v18 || A turla gift - popping calc.exe by sending an email
 
Automatic tool for static analysis
Automatic tool for static analysisAutomatic tool for static analysis
Automatic tool for static analysis
 
Tracking vulnerable JARs
Tracking vulnerable JARsTracking vulnerable JARs
Tracking vulnerable JARs
 
The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)The day I ruled the world (RootedCON 2020)
The day I ruled the world (RootedCON 2020)
 
Securing your web applications a pragmatic approach
Securing your web applications a pragmatic approachSecuring your web applications a pragmatic approach
Securing your web applications a pragmatic approach
 
OpenDaylight Brisbane User Group - OpenDaylight Security
OpenDaylight Brisbane User Group - OpenDaylight SecurityOpenDaylight Brisbane User Group - OpenDaylight Security
OpenDaylight Brisbane User Group - OpenDaylight Security
 
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
From Thousands of Hours to a Couple of Minutes: Automating Exploit Generation...
 
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
 
Extending Zeek for ICS Defense
Extending Zeek for ICS DefenseExtending Zeek for ICS Defense
Extending Zeek for ICS Defense
 
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...CSW2017 Enrico branca What if encrypted communications are not as secure as w...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
 
Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...
Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...
Abusing Adobe Reader’s JavaScript APIs by Abdul-Aziz Hariri & Brian Gorenc - ...
 
Building world-class security response and secure development processes
Building world-class security response and secure development processesBuilding world-class security response and secure development processes
Building world-class security response and secure development processes
 
The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...
 
AusCERT 2016: CVE and alternatives
AusCERT 2016: CVE and alternativesAusCERT 2016: CVE and alternatives
AusCERT 2016: CVE and alternatives
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
 
Kl 031.30 eng_class_setup_guide_1.2
Kl 031.30 eng_class_setup_guide_1.2Kl 031.30 eng_class_setup_guide_1.2
Kl 031.30 eng_class_setup_guide_1.2
 
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware AnalysisInside the Matrix,How to Build Transparent Sandbox for Malware Analysis
Inside the Matrix,How to Build Transparent Sandbox for Malware Analysis
 

Similar a Finding Triggered Malice in Android Apps

Attacks on Critical Infrastructure: Insights from the “Big Board”
Attacks on Critical Infrastructure: Insights from the “Big Board”Attacks on Critical Infrastructure: Insights from the “Big Board”
Attacks on Critical Infrastructure: Insights from the “Big Board”Priyanka Aash
 
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
Keeping Up with the Adversary:  Creating a Threat-Based Cyber TeamKeeping Up with the Adversary:  Creating a Threat-Based Cyber Team
Keeping Up with the Adversary: Creating a Threat-Based Cyber TeamPriyanka Aash
 
Autonomous Hacking: The New Frontiers of Attack and Defense
Autonomous Hacking: The New Frontiers of Attack and DefenseAutonomous Hacking: The New Frontiers of Attack and Defense
Autonomous Hacking: The New Frontiers of Attack and DefensePriyanka Aash
 
TriggerScope: Towards Detecting Logic Bombs in Android Applications
TriggerScope: Towards Detecting Logic Bombs in Android ApplicationsTriggerScope: Towards Detecting Logic Bombs in Android Applications
TriggerScope: Towards Detecting Logic Bombs in Android ApplicationsPietro De Nicolao
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
 
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Recon for the Defender: You Know Nothing (about Your Assets), Jon SnowRecon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Recon for the Defender: You Know Nothing (about Your Assets), Jon SnowPriyanka Aash
 
RSA 2018: Recon For the Defender - You know nothing (about your assets)
RSA 2018: Recon For the Defender - You know nothing (about your assets)RSA 2018: Recon For the Defender - You know nothing (about your assets)
RSA 2018: Recon For the Defender - You know nothing (about your assets)Jonathan Cran
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014viaForensics
 
Implementing An Automated Incident Response Architecture
Implementing An Automated Incident Response ArchitectureImplementing An Automated Incident Response Architecture
Implementing An Automated Incident Response ArchitecturePriyanka Aash
 
csmalware_malware
csmalware_malwarecsmalware_malware
csmalware_malwareJoshua Saxe
 
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...chennaijp
 
Replay of Malicious Traffic in Network Testbeds
Replay of Malicious Traffic in Network TestbedsReplay of Malicious Traffic in Network Testbeds
Replay of Malicious Traffic in Network TestbedsDETER-Project
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
 
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...IJCNCJournal
 
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...IJCNCJournal
 
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Priyanka Aash
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposPriyanka Aash
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsRod Soto
 

Similar a Finding Triggered Malice in Android Apps (20)

Attacks on Critical Infrastructure: Insights from the “Big Board”
Attacks on Critical Infrastructure: Insights from the “Big Board”Attacks on Critical Infrastructure: Insights from the “Big Board”
Attacks on Critical Infrastructure: Insights from the “Big Board”
 
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
Keeping Up with the Adversary:  Creating a Threat-Based Cyber TeamKeeping Up with the Adversary:  Creating a Threat-Based Cyber Team
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
 
Autonomous Hacking: The New Frontiers of Attack and Defense
Autonomous Hacking: The New Frontiers of Attack and DefenseAutonomous Hacking: The New Frontiers of Attack and Defense
Autonomous Hacking: The New Frontiers of Attack and Defense
 
TriggerScope: Towards Detecting Logic Bombs in Android Applications
TriggerScope: Towards Detecting Logic Bombs in Android ApplicationsTriggerScope: Towards Detecting Logic Bombs in Android Applications
TriggerScope: Towards Detecting Logic Bombs in Android Applications
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Recon for the Defender: You Know Nothing (about Your Assets), Jon SnowRecon for the Defender: You Know Nothing (about Your Assets), Jon Snow
Recon for the Defender: You Know Nothing (about Your Assets), Jon Snow
 
RSA 2018: Recon For the Defender - You know nothing (about your assets)
RSA 2018: Recon For the Defender - You know nothing (about your assets)RSA 2018: Recon For the Defender - You know nothing (about your assets)
RSA 2018: Recon For the Defender - You know nothing (about your assets)
 
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
 
Implementing An Automated Incident Response Architecture
Implementing An Automated Incident Response ArchitectureImplementing An Automated Incident Response Architecture
Implementing An Automated Incident Response Architecture
 
csmalware_malware
csmalware_malwarecsmalware_malware
csmalware_malware
 
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...JPD1424  A System for Denial-of-Service Attack Detection Based on Multivariat...
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
 
Replay of Malicious Traffic in Network Testbeds
Replay of Malicious Traffic in Network TestbedsReplay of Malicious Traffic in Network Testbeds
Replay of Malicious Traffic in Network Testbeds
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
FALCON.pptx
FALCON.pptxFALCON.pptx
FALCON.pptx
 
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
 
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
Transfer Learning: Repurposing ML Algorithms from Different Domains to Cloud ...
 
Automated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gposAutomated prevention of ransomware with machine learning and gpos
Automated prevention of ransomware with machine learning and gpos
 
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOsSPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
SPO2-T11_Automated-Prevention-of-Ransomware-with-Machine-Learning-and-GPOs
 

Más de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Más de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Finding Triggered Malice in Android Apps

  • 1. SESSION ID: #RSAC Christopher Kruegel Finding Triggered Malice in Android Apps MBS-W04 Chief Scientist Lastline, Inc.
  • 2. #RSAC Who am I? 2 Professor in Computer Science at UC Santa Barbara many systems security papers in academic conferences started malware research in about 2004 built and released practical systems (Anubis, Wepawet, …) Co-founder and Chief Scientist at Lastline, Inc. Lastline offers protection against zero-day threats and advanced malware effort to commercialize our research
  • 3. #RSAC What are we talking about? Android applications (apps) and mobile malware Power of static code analysis in the context of Android apps Tricky malware that uses triggers to evade detection Triggers and triggered malware in the wild 3
  • 5. #RSAC … and Android is leading the pack 5
  • 6. #RSAC Android Malware on the rise! Where are the differences to desktop applications? centralized control vet applications before they enter store can remotely remove installed applications carriers might have more complete picture of users and traffic apps are much easier to analyze statically use of Dalvik bytecode instead of x86 interesting GUI issues 6
  • 7. #RSAC Static Analysis for Android Apps Precise, scalable static analysis of Android apps Analysis over bytecode Minimal a priori assumptions regarding app design Cannot ignore difficult cases and adversarial behavior Do not consider apps in isolation (intents, user interaction, …) Scalability from the start 7
  • 8. #RSAC Dalvik Static Analysis Front-end APK unpacker DEX parser Androguard, dexlib produces custom IR Back-end operates on IR points-to, CFA, backwards slicing,… trigger analysis 8
  • 9. #RSAC Static Analysis 9 Tracking data flows is at the core of our analysis Analysis must handle not only data flows, but also values apps request permissions, but they are very coarse-grained string, value-range analysis
  • 10. #RSAC Static Analysis 10 Analysis must handle user interaction, activities, and intents otherwise, data flows can be “broken” Analysis must handle complex data structures standard collection classes key-value stores for intent parameters Whole system analysis
  • 11. #RSAC String Analysis 11 Robust and precise string modeling is a fundamental capability many interesting flows are parameterized by strings e.g., * ⇝ loadUrl symbolic strings are interesting and problematic String constraint solver tailored to common string operations in Android applications append, substring, reverse, charAt, delete, … STP as the backend SMT solver
  • 12. #RSAC Implicit Flow Reconstruction Android applications written as collections of event-driven or asynchronous components Activity, Service, BroadcastReceiver AsyncTask, Thread, Runnable, Callable requestLocationUpdates ⇝ onLocationChanged takePicture ⇝ onPictureTaken Analyzer models implicit flows through framework linking explicit handler registrations is straightforward implicit flow recovery through dynamic analysis 12
  • 13. #RSAC Implicit Flow Recovery 13 Identify previously unknown implicit flows increase coverage while preserving data flow precision Enabled by combination of instrumentation and Clicker tracing code injected, dynamic analysis driven by Clicker records exit points from application code records entry points into framework trace events binned by thread
  • 14. #RSAC Implicit Flow Recovery 14 Several classes of flows discovered explicit callback registration registration of callback groups “implicit” registration
  • 15. #RSAC (Some) Interesting Applications 15 Detection of triggered malware Finding GUI confusion attacks Finding dynamic code loading vulnerabilities Locate incorrect use of cryptography
  • 16. #RSAC (Some) Interesting Applications 16 Detection of triggered malware Finding GUI confusion attacks Finding dynamic code loading vulnerabilities Locate incorrect use of cryptography We focus on this one today!
  • 17. #RSAC Evasion and Triggers Malware authors are not sleeping they got the news that sandboxes are all the rage now since the code is executed, malware authors have options .. Evasion develop code that exhibits no malicious behavior in sandbox, but that infects the intended target 17
  • 18. #RSAC Evasion and Triggers 18 One key evasive technique relies on checking for specific values in the environment or inputs – these checks are called triggers Other evasive techniques used against sandbox technology exploit limited context avoid analysis (sleep, stalling) avoid analysis (move to kernel, for example, rootkits)
  • 19. #RSAC Trigger Analysis Data flow captures many important classes of malicious behaviors however, some behaviors are difficult to reason about purely through data flow 1. Analysis to find interesting checks that exhibit characteristics of triggering behavior adversaries often want to predicate their attack based on environmental conditions analysis identifies usage of predicates based on environmental data (e.g., location, time, SMS) 2. Then determine whether these checks guard “interesting” behaviors 19
  • 20. #RSAC Find Interesting Checks (1/2) Find conditionals that depend on interesting input location, date, time, SMS input … Use data flow analysis to determine where interesting input flows to, and what operations the program performs on these inputs Propagate constraints on input values along program paths we call these path predicates 20
  • 21. #RSAC Find Interesting Checks (2/2) Check for characteristics of triggering behavior checks might be very specific do the predicates significantly constrain the value domain? are there many checks applied to an input? program performs unusual operations on certain inputs do we see unusual operations / operands for certain inputs? These are heuristics, and we need to know something about the numbers and types of checks that benign programs perform on certain types of input 21
  • 22. #RSAC Find Interesting Checks 22 Example – Malicious application void onCreate(Bundle savedInstanceState) { currentTime = new Time(Time.getCurrentTimezone()); currentTime.setToNow(); newSiteAvailable = (currentTime.month > 4 && currentTime.month < 8) && currentTime.year >= 2013; How unusual is this?
  • 23. #RSAC Find Interesting Checks 23 Analysis of 3K apps yields Checks in malicious app yield a score of 3.7
  • 24. #RSAC Find Checks That Guard Behavior 24 Analysis can point human to suspicious checks support manual review Maybe we can do better check whether trigger-like check guards sensitive operation Easier approach check for sensitive operations directly on path guarded by check More complete approach check whether check can influence sensitive operation anywhere in the program
  • 25. #RSAC Find Checks That Guard Behavior 25 boolean onOptionsItemSelected(MenuItem item) { String updateUrl = ""; if(newSiteAvailable) { url = "http://www.evil.com"; updateUrl = getUpdatedUrl(); startIntent(url, updateUrl); else { startIntent(url); }
  • 26. #RSAC What did we find? Dataset of ~10K apps from the Google market Collection of triggered malware DARPA apps developed by Red Team Holy Colbert Trojan (backdoor in legitimate app) Zitmo (Zeus-In-The-MOile) RCSAndroid (Hacking Team) 26
  • 27. #RSAC Google Market Dataset of ~10K apps from the Google market 27 Domain # Apps # Apps w/ Checks # Suspicious Checks # Guarded Behavior # Post- processed Time 4,950 1,026 302 30 10 Location 3,430 137 71 23 8 SMS 1,138 223 89 64 17
  • 29. #RSAC Time Triggers Benign triggers to check for updates to implement countdown functionality 29
  • 31. #RSAC Location Triggers Benign triggers based on user-defined areas one interesting trigger for specific Japanese train station 31
  • 33. #RSAC SMS Triggers Mostly benign triggers apps check for sender, sender’s phone, or content to check if they need to process SMS for regular app functionality Two suspicious examples found tw.nicky.LockMyPhoneTrial (RemoteLock) com.innovationdroid.myremotephone (MyRemotePhone) 33
  • 34. #RSAC SMS Triggers RemoteLock (removed ~2013 from PlayStore) checks whether the incoming SMS matches with a long, hardcoded string (“adf…yhytdfsw”). If that is the case, the application unlocks the phone! MyRemotePhone (still available on PlayStore) checks whether the incoming SMS contains the following two strings: MPS: and gps (now mrp: gps). If that is the case, the application automatically sends an SMS to the original sender containing the current GPS coordinates! 34
  • 35. #RSAC Malware Samples DARPA Red Team apps deliberately developed to bypass dynamic analysis 5 time triggers (hardcoded dates and times) 1 location trigger [ based on Location.distanceBetween() ] 5 SMS triggers (contents of messages) malicious activity were data leaks and integrity violations 35
  • 36. #RSAC Malware Samples Zitmo checks for content in SMS to steal mTANs for banks SMS used to implement command and control Holy Colbert time trigger based on SimpleDateFormat API 36
  • 37. #RSAC Malware Samples RCSAndroid remote control app written by HackingTeam SMS-based trigger (comparison with values from a file) behaviors range from data leakage (send conversations, device information) to capture of screenshots and voice calls 37
  • 38. #RSAC RCSAndroid SMS-based check (comparison with values from a file) 38
  • 39. #RSAC RCSAndroid Based on the checks, an action is triggered … 39
  • 40. #RSAC (Some) Interesting Applications 40 Detection of triggered malware Finding GUI confusion attacks Finding dynamic code loading vulnerabilities Locate incorrect use of cryptography
  • 41. #RSAC Dynamic Code Loading Apps can load code dynamically at runtime download code from the Internet or local files various ways (DexClassLoader, CreatePackageContext, …) 41
  • 42. #RSAC Dynamic Code Loading Vulnerabilities Insecure downloads load code over HTTP Unprotected storage downloaded code is stored in location accessible to other apps Improper use of package names load code from other apps, specifying only package names 42
  • 43. #RSAC Dynamic Code Loading Vulnerabilities Top 50 free apps around end of 2013 43
  • 44. #RSAC Finding Incorrect Use of Crypto Finding apps that use broken crypto developers are not security experts AES/ECBAES/CBCPlaintext 44
  • 45. #RSAC Finding Incorrect Use of Crypto Almost 12K apps that use crypto 31% use known key 65% use ECB 16% use known IV for CBC 45
  • 46. #RSAC Lessons Learned 46 Understand that mobile threats are real Google Bouncer not enough Understand that fighting mobile malware is fundamentally different than fighting Windows malware ask your vendor how they detect mobile malware demand certain protection guarantees Vulnerabilities are real and widespread how to manage app installation, patching, … ?
  • 47. #RSAC Conclusions 47 Smartphones and apps increasingly popular and important Interesting differences between apps and traditional desktop programs allow for important security improvements easier static analysis Using static analysis to identify triggers and environmental checks in malicious Android apps