usenix conference policies
Kharon Dataset: Android Malware under a Microscope
Nicolas Kiss, Université de Rennes 1; Jean-Francois Lalande, University of Orléans; Mourad Leslous and Valérie Viet Triem Tong, Université de Rennes 1
Background—This study is related to the understanding of Android malware that now populate smartphone’s markets.
Aim—Our main objective is to help other malware researchers to better understand how malware works. Additionally, we aim at supporting the reproducibility of experiments analyzing malware samples: such a collection should improve the comparison of new detection or analysis methods.
Methodology—In order to achieve these goals, we describe here an Android malware collection called Kharon. This collection gives as much as possible a representation of the diversity of malware types. With such a dataset, we manually dissected each malware by reversing their code. We run them in a controlled and monitored real smartphone in order to extract their precise behavior. We also summarized their behavior using a graph representations of the information flows induced by an execution. With such a process, we obtained a precise knowledge of their malicious code and actions.
Results and conclusions—Researchers can figure out the engineering efforts of malware developers and understand their programming patterns. Another important result of this study is that most of malware now include triggering techniques that delay and hide their malicious activities. We also think that this collection can initiate a reference test set for future research works.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Nicolas Kiss and Jean-Francois Lalande and Mourad Leslous and Val{\'e}rie Viet Triem Tong},
title = {Kharon Dataset: Android Malware under a Microscope},
booktitle = {The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2016)},
year = {2016},
isbn = {978-1-931971-35-5},
address = {San Jose, CA},
pages = {1--12},
url = {https://www.usenix.org/conference/laser2016/program/presentation/kiss},
publisher = {USENIX Association},
month = may
}
connect with us