Basit öğe kaydını göster

dc.contributor.authorBakour, Khaled
dc.contributor.authorUnver, Halil Murat
dc.contributor.authorGhanem, Razan
dc.date.accessioned2020-06-25T18:30:29Z
dc.date.available2020-06-25T18:30:29Z
dc.date.issued2019
dc.identifier.citationclosedAccessen_US
dc.identifier.issn2193-567X
dc.identifier.issn2191-4281
dc.identifier.urihttps://doi.org/10.1007/s13369-019-04081-5
dc.identifier.urihttps://hdl.handle.net/20.500.12587/7653
dc.descriptionBakour, Khaled/0000-0003-3327-2822en_US
dc.descriptionWOS: 000487119100025en_US
dc.description.abstractThe threats facing smartphones have become one of the most dangerous cyberspace threats; therefore, many solutions have been developed in the commercial or academic domain to address these threats. This paper aims to test the defence robustness of some well-known commercial anti-malware systems against camouflage techniques. To this end, multiple attacks have been proposed and applied to create multiple camouflaged malware datasets based on well-known malware datasets. First of all, we proposed two injection attacks, namely benign permissions injection attack and benign permissions-code injection attack; these attacks have been used with one more attack called app re-signing attack. To the best of our knowledge, these injection attacks have been used for the first time in the Android OS domain. Furthermore, the proposed attacks have been hybridized with some commonly used obfuscation techniques, namely string encryption, class encryption, and reflection, to obtain a high degree of camouflage and avoiding anti-malware systems' detection. To our knowledge, this is the first time that the obfuscation techniques are hybridized with other attacks. The obtained results showed that the detection accuracy of most tested anti-malware systems dropped to about 10% or less. Moreover, the average number of engines which was able to detect malware samples decreased from 45 engines when the original dataset has been tested to about 12 engines when the camouflaged datasets have been tested.en_US
dc.language.isoengen_US
dc.publisherSpringer Heidelbergen_US
dc.relation.isversionof10.1007/s13369-019-04081-5en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAndroid's anti-malware systemen_US
dc.subjectInjection attacken_US
dc.subjectObfuscation techniquesen_US
dc.subjectReflectionen_US
dc.subjectClass encryptionen_US
dc.subjectString encryptionen_US
dc.titleA Deep Camouflage: Evaluating Android's Anti-malware Systems Robustness Against Hybridization of Obfuscation Techniques with Injection Attacksen_US
dc.typearticleen_US
dc.contributor.departmentKırıkkale Üniversitesien_US
dc.identifier.volume44en_US
dc.identifier.issue11en_US
dc.identifier.startpage9333en_US
dc.identifier.endpage9347en_US
dc.relation.journalArabian Journal For Science And Engineeringen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US


Bu öğenin dosyaları:

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster