Visible to the public Resilient Decentralized Android Application Repackaging Detection Using Logic Bombs

TitleResilient Decentralized Android Application Repackaging Detection Using Logic Bombs
Publication TypeConference Paper
Year of Publication2018
AuthorsZeng, Qiang, Luo, Lannan, Qian, Zhiyun, Du, Xiaojiang, Li, Zhoujun
Conference NameProceedings of the 2018 International Symposium on Code Generation and Optimization
Date PublishedFebruary 2018
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5617-6
KeywordsAndroid app repackaging, android encryption, Code Obfuscation, Human Behavior, human factors, Metrics, pubcrawl, resilience, Resiliency, Scalability
Abstract

Application repackaging is a severe threat to Android users and the market. Existing countermeasures mostly detect repackaging based on app similarity measurement and rely on a central party to perform detection, which is unscalable and imprecise. We instead consider building the detection capability into apps, such that user devices are made use of to detect repackaging in a decentralized fashion. The main challenge is how to protect repackaging detection code from attacks. We propose a creative use of logic bombs, which are regularly used in malware, to conquer the challenge. A novel bomb structure is invented and used: the trigger conditions are constructed to exploit the differences between the attacker and users, such that a bomb that lies dormant on the attacker side will be activated on one of the user devices, while the repackaging detection code, which is packed as the bomb payload, is kept inactive until the trigger conditions are satisfied. Moreover, the repackaging detection code is woven into the original app code and gets encrypted; thus, attacks by modifying or deleting suspicious code will corrupt the app itself. We have implemented a prototype, named BombDroid, that builds the repackaging detection into apps through bytecode instrumentation, and the evaluation shows that the technique is effective, efficient, and resilient to various adversary analysis including symbol execution, multi-path exploration, and program slicing.

URLhttps://dl.acm.org/doi/10.1145/3168820
DOI10.1145/3168820
Citation KeyzengResilientDecentralizedAndroid2018