E-mail senden E-Mail Adresse kopieren
2021-01-01

Detecting Call Indirection Obfuscation through Equivalence Checking in Android environment

Zusammenfassung

The detection mechanism provided by current antimalware is the so-called signature based, requiring that a threat must be widespread to be recognised by the antimalware. Even if a malware is rightly recognized, by applying even trivial obfuscation techniques, it is really easy to bypass the antimalware detection mechanism. In this paper we propose a method to detect if an Android application is obfuscated with the call indirection obfuscation techniques by exploiting formal equivalence checking. In the experimental analysis we show the effectiveness of the propose approach for call indirection obfuscation technique detection, by exploiting two obfuscation tools.

Artikel

Veröffentlichungsdatum

2021-01-01

Letztes Änderungsdatum

2024-09-06