Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Making malory behave maliciously: Targeted fuzzing of android execution environments

: Rasthofer, Siegfried; Arzt, Steven; Triller, Stefan; Pradel, Michael


Institute of Electrical and Electronics Engineers -IEEE-; IEEE Computer Society; Association for Computing Machinery -ACM-:
IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017. Proceedings : 20-28 May 2017, Buenos Aires, Argentina
Piscataway, NJ: IEEE, 2017
ISBN: 978-1-5386-3868-2
ISBN: 978-1-5386-3869-9
International Conference on Software Engineering (ICSE) <39, 2017, Buenos Aires>
Conference Paper
Fraunhofer SIT ()

Android applications, or apps, provide useful features to end-users, but many apps also contain malicious behavior. Modern malware makes understanding such behavior challenging by behaving maliciously only under particular conditions. For example, a malware app may check whether it runs on a real device and not an emulator, in a particular country, and alongside a specific target app, such as a vulnerable banking app. To observe the malicious behavior, a security analyst must find out and emulate all these app-specific constraints. This paper presents FuzzDroid, a framework for automatically generating an Android execution environment where an app exposes its malicious behavior. The key idea is to combine an extensible set of static and dynamic analyses through a search-based algorithm that steers the app toward a configurable target location. On recent malware, the approach reaches the target location in 75% of the apps. In total, we reach 240 code locations within an average time of only one minute. To reach these code locations, FuzzDroid generates 106 different environments, too many for a human analyst to create manually.