280 likes | 313 Views
This research paper explores the limitations of current anti-virus solutions for mobile devices and proposes a behavioral detection framework that overcomes these limitations. The framework utilizes a database of behavior profiles to monitor and compare the runtime behavior of applications, making it more resilient to malware. The system also incorporates machine learning algorithms for behavior classification. The paper discusses the advantages of this approach and highlights possible evasions and countermeasures.
E N D
Presented by: Suparna Manjunath Dept of Computer & Information Sciences University of Delaware Behavioral Detection of Malware on Mobile Handsets Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
Malware on Mobile Handsets • Like PC’s Mobile Handsets are becoming more intelligent and complex in functionality • Exposure to malicious programs and risks increase with the new capabilities of handsets • Cabir, the first mobile worm appeared in June 2004 • WinCE.Duts, the Windows CE virus was the first file injector on mobile handsets capable of infecting all the executables in the device’s root directory
Limitations of current anti-virus solutions for mobile devices • Rely primarily on signature-based detection • Useful mostly for post-infection cleanup • Example: • Scan the system directory for the presence of files with specific extension • .APP, .RSC and .MLD in Symbian-based devices • Due to differences between mobile and traditional desktop environments
Why conventional anti-virus solutions are less efficient for mobile devices? • Mobile devices generally have limited resources such as CPU, memory, and battery power • Most published studies on the detection of internet malware focus on their network signatures • Mobile OSes have important differences in the way file permissions and modifications to the OS are handled
Goal • Develop a detection framework that • Overcomes the limitations of signature based detection • Address the unique features and constraints of mobile handsets
Approach Behavioral detection approach is used to detect malware on mobile handsets
Behavioral Detection • Run-time behavior of an application is monitored and compared against malicious and/or normal behavior profiles • More resilient to polymorphic worms and code obfuscation • Database of behavior profiles is much smaller than that needed for storing signature-based profiles • Suitable for resource limited handsets • Has potential for detecting new malware
Malicious Behavior Signatures • Behavior Signature: Manifestation of a specification of resource accesses and events generated by applications • It is not sufficient to monitor a single event of a process in isolation in order to classify an activity to be malicious • Temporal Pattern: The precedence order of the events and resource accesses, is the key to detect malicious intent
Temporal Patterns - Example • Consider a simple file transfer by calling the Bluetooth OBEX system call in Symbian OS • On their own, any such call will appear harmless • Temporal Pattern: • (received file is of type .SIS) and(that file is executed later)and(installer process seeks to overwrite files in the system directory)
Representation of Malicious Behavior • Simple Behavior: ordering the corresponding actions using a vector clock and applying the “and” operator to the actions • Complex Behavior: specified using temporal logic instead of classical propositional logic • Specification language of TLCK(Temporal Logic of Causal Knowledge) is used to represent malicious behaviors within the context of a handset environment
Behavior Signature • A finite set of propositional variables interposed using TLCK • Each variable (when true) confirms the execution of either • - A single or an aggregation of system calls • - An event such as read/write access to a given file descriptor, directory structure or memory location • PS = {p1, p2, ・ ・ ・ , pm} U {i|i ∈ N}
Operators used to define Malicious Behavior Logical Operators: Temporal Operators:
Higher Level Signatures Harmless Signatures: Harmful Signatures:
Generalized Behavior Signatures • Studied more than 25 distinct families of mobile viruses and worms targeting the Symbian OS • Extracted most common signature elements and a database was created • Malware actions were placed were placed into 3 categories: • - User Data Integrity • - System Data Integrity • - Trojan-like Actions
Run-Time Construction of Behavior Signatures Proxy DLL to capture API call arguments
Behavior Classification By Machine Learning Algorithm • Behavior signatures for the complete life cycle of malware are placed in the behavior database for run-time classification • To activate early response mechanisms, malicious behavior database must also contain partial signatures that have a high probability of eventually manifesting as malicious behavior • Behavior detection system can detect even new malware or variants of existing malware, whose behavior is only partially matched with the signatures in the database • SVM is used to classify partial behavior signatures from the training data of both normal and malicious applications
Possible Evasions • Program behavior can be obfuscated by: • Behavior reordering • File or directory renaming • Normal behavior insertion • Equivalent behavior replacement
Limitations • The detection might fail if most behaviors of a mobile malware are completely new or the same as normal programs • The system can be circumvented by malware that can bypass the API monitoring or modify the framework configuration
Evaluation • Monitor agent (platform dependent) and Behavior detection agent (platform independent) is evaluated • Program behavior is emulated and then tested against real-world worms • 5 malware applications (Cabir, Mabir, Lasco, Commwarrior, and a generic worm that spreads by sending messages via MMS and Bluetooth) and 3 legitimate applications (Bluetooth OBEX file transfer, MMS client, and the MakeSIS utility in Symbian OS) were built Training Dataset Applications (Malwre + Legitimate) Set of Behavior Signatures Obtain Partial/ Full Signatures Remove Redundant Signatures Testing Dataset
Evaluation with Real-world Mobile Worms • Two Symbian worms, Cabir and Lasco are considered • Behavior signatures are collected by compiling and running them on Symbian emulator • -SVC achieved 100% detection of all worm instances • Framework’s resilience to the variations and obfuscation is tested by considering the variants of Cabir • - The variants are easily detectable as the behavioral detection abstracts away the name details
Conclusions • Due to fewer signatures, the malware database is compact and can be place on a handset • Can potentially detect new malware and their variants • Behavioral detection results in high detection rates