Automatic Components Separation of Obfuscated Android Applications: An Empirical Study of Design Based Features
In modern days, mobile applications (apps) have become omnipresent. Components of mobile apps (such as 3rd party libraries) require to be separated and analyzed differently for security issue detection, repackaged app detection, tumor code purification and so on. Various techniques are available to automatically analyze mobile apps. However, analysis of the app’s executable binary remains challenging due to required curated database, large codebases and obfuscation. Considering these, we focus on exploring a versatile technique to separate different components with designed based features independent of code obfuscation. Particularly, we conducted an empirical study using design patterns and fuzzy signatures to separate programming design components such as 3rd party libraries. In doing so, we have built a system for automatically extracting design patterns from both the executable package (APK) and Jar of an Android application. We have experimented the relationship and impact of design patterns in 3rd party libraries, usual apps and Android malware. The experimental outcome with various standard datasets containing obfuscated apps and malwares reveals that design features like these are present significantly within them (within 60% APKs including malware). Moreover, these features remain unaltered even after app obfuscation. Finally, as a case study, we have shown that the design patterns alone can detect 3rd party libraries within the obfuscated apps considerably (F1 score is 32%). Overall, our empirical study reveals that design features might play a versatile role in separating various Android components for various purposes.
Mon 11 NovDisplayed time zone: Tijuana, Baja California change
14:00 - 15:30 | |||
14:00 30mTalk | Automated Support for Testing and Maintenance of Mobile Applications A-Mobile Mattia Fazzini University of Minnesota | ||
14:30 30mResearch paper | Automatic Components Separation of Obfuscated Android Applications: An Empirical Study of Design Based Features A-Mobile Amit Kumar Mondal , Chanchal K. Roy University of Saskatchewan, Banani Roy University of Saskatchewan, Kevin Schneider University of Saskatchewan | ||
15:00 30mResearch paper | SeMA: A Design Methodology for Building Secure Android Apps A-Mobile Pre-print Media Attached |