Resilient Decentralized Android Application Repackaging Detection Using Logic Bombs
Title | Resilient Decentralized Android Application Repackaging Detection Using Logic Bombs |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Zeng, Qiang, Luo, Lannan, Qian, Zhiyun, Du, Xiaojiang, Li, Zhoujun |
Conference Name | Proceedings of the 2018 International Symposium on Code Generation and Optimization |
Date Published | February 2018 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-5617-6 |
Keywords | Android app repackaging, android encryption, Code Obfuscation, Human Behavior, human factors, Metrics, pubcrawl, resilience, Resiliency, Scalability |
Abstract | Application repackaging is a severe threat to Android users and the market. Existing countermeasures mostly detect repackaging based on app similarity measurement and rely on a central party to perform detection, which is unscalable and imprecise. We instead consider building the detection capability into apps, such that user devices are made use of to detect repackaging in a decentralized fashion. The main challenge is how to protect repackaging detection code from attacks. We propose a creative use of logic bombs, which are regularly used in malware, to conquer the challenge. A novel bomb structure is invented and used: the trigger conditions are constructed to exploit the differences between the attacker and users, such that a bomb that lies dormant on the attacker side will be activated on one of the user devices, while the repackaging detection code, which is packed as the bomb payload, is kept inactive until the trigger conditions are satisfied. Moreover, the repackaging detection code is woven into the original app code and gets encrypted; thus, attacks by modifying or deleting suspicious code will corrupt the app itself. We have implemented a prototype, named BombDroid, that builds the repackaging detection into apps through bytecode instrumentation, and the evaluation shows that the technique is effective, efficient, and resilient to various adversary analysis including symbol execution, multi-path exploration, and program slicing. |
URL | https://dl.acm.org/doi/10.1145/3168820 |
DOI | 10.1145/3168820 |
Citation Key | zengResilientDecentralizedAndroid2018 |