Annual Computer Security Applications Conference 2015

Full Program »

T4. Understanding and Contrasting Android Malware at Runtime

Tuesday, 8 December 2015
08:30 - 12:00

Salon 6A

[This is a full day session.]

Android-based devices are the most sold in the world dominating the market share with a solid 78.4% [1]. A key-aspect in Android's success is the support for third-party applications (or simply apps) creating a very dynamic software landscape accessible through the Google Play marketplace as well as third-party markets.

The rate of Android success is only matched by the increase in malicious activity targeting Android. Between 2011 and 2012 the malware samples targeting Android has gone up of 1000% [2]. At the end of 2012, Android has crashed another record becoming the top target for malicious code overtaking Microsoft's Windows operating system [3].

Android is not only dominating the mobile device market (smartphones and tablets), but is also becoming predominant in mission critical support and infotainment car systems. The implication of its security issues can be very important in these areas as well. For instance, through Android malware could find its way to interact with the Can Bus system of a car. Also, Android is very relevant in Internet of Things (IoT) devices where it is being used as OS.

This course will be organised in two main components. In the first component, we will study the security model in Android and how malware is able to bypass some of its security features. To better understand the security exploits, this first part of the course will be dedicated to the Android security framework and how apps interact with it. We will cover also recent research effort for enhancing Android security.

The second part of the course is more practical. Firstly, we will focus on the analysis of malware samples. To demonstrate the malware capabilities, we will use a real Android device where the malware samples will be installed and executed. Afterwards, students be organised in teams (2 to up to 4 students depending on the final number of attendees) and will have access to a policy-based tool developed at the University of Auckland for protecting Android devices. This tool, called FireDroid and presented at ACSAC 13, allows the definition of security policies from a web-based console and can be deployed over the air to an Android device. We will provide each team with an Android device where malware samples will be installed. Each team will define security policies and deploy them on the infected devices to stop malware attacks. Finally, we will review the policies each team come up with and discuss the strategies for creating such policies.

[1] Gartner Says Annual Smartphone Sales Surpassed Sales of Feature Phones for the First Time in 2013 http://www.gartner.com/newsroom/id/2665715 

[2] Android malware up over 1000% in last three months.  http://www.ibtimes.co.uk/articles/401395/20121105/android-malware-increae-ten-fold.htm.

[3] The changing face of security: Android overtakes windows as top threat. http://www.technologyreview.com/view/508316/the-changing-face-of-security-android overtakes-windows-as-top-threat/

Learning Objectives:

Prerequisites. An understanding of Operating Systems (Linux in particular) and Access control models (MAC and DAC).

Outline:

PART I

  1. Introduction
    • An initial overview of the course content followed by an overview of the basic principle of system security to bring all the students at the same level of knowledge on access control and policy-based systems.
  2. Overview of the Android Security Framework and Inter Component Communication (ICC)
    • We will dive in the details of the security framework of Android and some of its not-so-well documented exceptions / refinements. To better understand some of the malware action is also important to cover the ICC mechanism offered by Android to apps for exchanging information and communicate with the system services (e.g., SMS sending service).
  3. State of the Art
    • We will discuss the state of the art in research, covering the most recent research efforts in security for the Android OS. We will also discuss why current commercial solutions, such as Anti-Virus Software are not capable of contrasting this huge wave of attacks.
  4. Malware Classification
    • There are several malware families for Android. We will discuss each of these families providing details of their malicious actions, and what damage/loss they cause.

PART II

  1. Malware Runtime Demonstration
    • In this part of the course, we will use a real device where several malware samples will be deployed and executed. The most important aspects of the attack for each malware will be highlighted to the students.
  2. Hands-on: Blocking Malware
    • In this component of the course, students will form teams and will have access to the policy specification tool and a device with malware samples.  After a brief explanation of how the tool works each team will have to analyse the malware and define policies to block its attack. Material will be provided to the students to familiarize themselves with the tool prior to the course.
  3. Policy Review and Concluding Thoughts
    • Each team will provide a short presentation describing their policies and the strategy used to define them. We will wrap up the course thanking the students.

About the Instructor:

Dr. Giovanni Russello is a lecturer at the University of Auckland. He has worked in access control and cloud security for the past 8 years. In the past three years, he has also worked in enhancing the security for the Android OS.

Giovanni has given a similar course at ACSAC 2013. This course is based on a post-graduate course (20 hours of lectures), taught at his department during Semester 1 in 2013 (March to May). Students who attended this course were very enthusiastic and find it very useful.

 

Powered by OpenConf®
Copyright©2002-2015 Zakon Group LLC