Abstract | ||
---|---|---|
More and more app developers use the packing services (or packers) to prevent attackers from reverse engineering and modifying the executable (or Dex files) of their apps. At the same time, malware authors also use the packers to hide the malicious component and evade the signature-based detection. Although there are a few recent studies on unpacking Android apps, it has been shown that the evolving packers can easily circumvent them because they are not adaptive to the changes of packers. In this paper, we propose a novel adaptive approach and develop a new system, named PackerGrind, to unpack Android apps. We also evaluate PackerGrind with real packed apps, and the results show that PackerGrind can successfully reveal the packers' protection mechanisms and recover the Dex files with low overhead, showing that our approach can effectively handle the evolution of packers. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/ICSE.2017.40 | ICSE |
Keywords | Field | DocType |
Dynamic Analysis,App Unpacking | Android (operating system),Computer security,Computer science,Reverse engineering,Malware,Operating system,Unpacking,Software mining,Executable | Conference |
ISSN | ISBN | Citations |
0270-5257 | 978-1-5386-3869-9 | 18 |
PageRank | References | Authors |
0.70 | 27 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lei Xue | 1 | 103 | 16.03 |
Xiapu Luo | 2 | 1302 | 110.23 |
Yu Le | 3 | 50 | 3.81 |
Shuai Wang | 4 | 114 | 19.15 |
Dinghao Wu | 5 | 726 | 54.89 |