Home » R&I Project Hub » CyberSANE » Project White Papers » Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation

Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation

Authors

Giuseppe Crincoli, Tiziano Marinaro, Fabio Martinelli, Francesco Mercaldo, Antonella Santone

Publication

International Conference on Advanced Information Networking and Applications
AINA 2020: Advanced Information Networking and Applications pp 1368-1382

https://doi.org/10.1007/978-3-030-44041-1_116

Abstract

As evidenced from current literature in software security, the current signature detection mechanisms can be easily evaded by attackers simply applying trivial obfuscation techniques, usually with software engines able to automatically inject junk code into malicious applications. In fact, the employment of obfuscation code techniques is adopted by attackers to generate several (undetected) variants of one malicious sample, making its signature obsolete. Considering that the signature definition is a laborious process manually performed by security analysts, in this paper we propose a method, exploiting weak bisimulation, to detect whether an Android application is modified by means of the code reordering obfuscation technique. We present an experimental analysis performed on a real-world data-set of Android applications (obfuscated and not obfuscated), reaching interesting results in the code reordering obfuscation technique detection.

Publication Date: 
28/03/2020