簡易檢索 / 詳目顯示

研究生: 鄭容沛
Jung-Pei Cheng
論文名稱: 基於使用者意圖追蹤與事件探勘之Android SMS木馬惡意程式偵測
Android SMS Trojan Malware Detection Using User Intent Leak Tracing and Frequent Episode Rule Mining
指導教授: 李漢銘
Hahn-Ming Lee
口試委員: 鄭博仁
Albert B. Jeng
田筱榮
Hsiao-Rong Tyan
鄧惟中
Wei-Chung Teng
廖弘源
Hong-Yuan Liao
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 英文
論文頁數: 77
中文關鍵詞: SMS木馬Android惡意程式智慧型手機簡訊收費靜態分析頻繁情節探勘意圖追踨
外文關鍵詞: SMS Trojans, SMS malware, Premium-Rate fraud, Frequent Episode Rule Mining
相關次數: 點閱:192下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 拜智慧型手機發展之賜,Android系統以及相關App的擴展數量相當快速,提供人們在行動通訊上的便利性,但也因為結合傳統手機功能,惡意程式可以在使用者不知道的情況下,擅自寄送簡訊訂閱服務,造成使用者財務損失。
    本研究提出基於使用者意圖追踨與事件探勘之Android SMS木馬惡意程式偵測機制,此機制包含「使用者意圖追踨」與「事件探勘」二個部份,使用者意圖主要用來判定是否有API Call是在使用者不知道的情況下運行,藉由追踨API Call的使用來分析是否有使用者意圖情形來產生事件序列,再來利用事件探勘技術由事件序列取得最頻繁的攻擊情節。
    本研究利用上述機制設計出一套系統「SMSDroidCare」,首先利用反向工程取出程式之API Call使用資訊,接著追踨API Call的使用,分析是否有使用者意圖情形,再配合事前分析SMS木馬惡意程式擅自發送SMS簡訊進行收費服務訂閱的行為所制定的事件序列類型,其符合產生的事件序列透過頻繁情節探勘出最頻繁的情節法則模式。在我們的實驗中,我們說明考慮使用者意圖與API Call的使用,藉由頻繁情節法則模式探勘結果,能夠判別及偵測惡意SMS簡訊收費服務訂閱行為,改善目前SMS木馬惡意程式偵測的準確率。


    Due to the development of smartphones, the number of Android-based applications expands quite rapid, which offers people the convenience of mobile communications. Short message service (SMS) is basic communication component and one of the most frequently used services in the mobile phones so malware can send message to subscribe premium service without the user's awareness so as to cause financial charges.
    This study proposes the user intent leak tracing and frequent episode rule mining to provide a static analysis for detecting the Android SMS Trojan malware. User intent leak would indicate that sensitive function call be performed without the user’s awareness and can be traced in API Call usage to produce the event sequences. These event sequences, then, can be used in frequent episode rule mining to find out the frequent episode patterns, also called frequent attack episode patterns.
    Moreover, this paper leverages the proposed mechanism to develop a system, named SMSDroidCare. First, API Call usage information can be extracted from SMS Trojan malwares or begin apps using reverse engineering tool. And then, the user intent leak flow that occurs in API Call usage can be traced to produce the event sequences as well as event type has pre-defined according to how android SMS premium-rate fraud works. Next, frequent episode rules are mined from the event sequences, which identifies meaningful attack rule patterns. Finally, these rule patterns is be used to determine whether the application is malicious or not and detect malicious SMS premium-rate fraud behavior.
    In the experiments, we demonstrate that SMS Trojan malwares can be detected by considering user intent leak. In addition, our proposed method can improve detecting rate of the SMS Trojan malwares.

    AbstractI AcknowledgementsIV Chapter 1Introduction1 1.1Motivations2 1.2Challenges and Goals5 1.3Contributions6 1.4The Outline of Thesis6 Chapter 2Background and Related Work7 2.1Overview of Android8 2.1.1Android Components8 2.1.2Android Activity Lifecycle9 2.1.3Intent and Intent-Filter11 2.2Reverse Engineering of Malware on Android12 2.3SMS Attack Malware13 2.3.1Characteristics of SMS Attack14 2.3.2Characteristics of Android Malware15 2.3.3Premium Rate Fraud for SMS Trojan Malware16 2.4Malware Detection Techniques20 2.5Frequent Episode Rule Mining20 Chapter 3User Intent Leak and Frequent Episode Rule Mining for Android SMS Trojan Detection25 3.1The Concept of SMS Trojan Detection26 3.2The System Architecture of SMS Trojan Detection26 3.3Event Producer27 3.3.1Reverse Engineering28 3.3.2User Intent Leak Tracing30 3.3.3Event Type Definition31 3.3.4Event Sequence Producing33 3.4Episode Rule Pattern Generation34 3.4.1Generating Candidate Episode Sets34 3.4.2Generating Frequent Episode Rules35 3.5Android SMS Trojan Malware Pattern Finding36 3.6Approach Discussion36 3.6.1Approach Characteristics37 3.6.2Approach Limitations38 Chapter 4Experiments39 4.1Experiment Design and Dataset40 4.1.1Experiment Concept and Description40 4.1.2Datasets40 4.2The Parameters for Frequent Episode Rule Mining Analysis41 4.3Evaluation Metrics44 4.4Effectiveness Analysis45 4.4.1Effectiveness Comparison with Mobile Anti-Virus Software and SMSDroidCare45 4.4.2Effectiveness Comparison between AVG and SMSDroidCare47 4.5Pattern Comparison between SMS Malware Family49 4.6Experiment Discussion49 4.6.1False Detection Analysis50 4.6.2Limitations51 Chapter 5Conclusions and Further Work52 5.1Conclusions53 5.2Further Work54 References…...55 Appendix A - SMS-Related Benign App List60

    [1]"Android Malware Genome Project," http://www.malgenomeproject.org/
    [2]AndroidPolice.com. "Premium SMS Confirmation," http://www.androidpolice
    .com/2012/10/17/exclusive-android-4-2-alpha-teardown-part-2-selinux-vpn-lockdown-and-premium-sms-confirmation/
    [3]"APKTool," https://code.google.com/p/android-apktool/
    [4]APWG Mobile Report. "White Paper: Mobile Financial Fraud," April 2013 http://docs.apwg.org/reports/mobile/APWG_Mobile_Report_v1.9.pdf
    [5]Bitdefender Resource Center , "Android Vulnerability Opens Door to SMS Phishing Scams ," http://www.bitdefender.com/security/android-vulnerability
    -opens-door-to-sms-phishing-scams.html, 2012
    [6]CRN.com : Technology News "Android Under Attack," http://www.crn.in/
    feature/android-under-attack
    [7]"Dex2jar," https://code.google.com/p/dex2jar/
    [8]"dmt4sp," http://liris.cnrs.fr/~crigotti/dmt4sp.html
    [9]ESET Research Lab "SMS Trojan Whitepaper," http://www.welivesecurity
    .com/wp-content/media_files/SMS_Trojan_Whitepaper.pdf, 2012
    [10]eWeek.com: Technology News. "Mobile (SMS-Based) Malware Threats to Rise in 2013," http://www.eweek.com/mobile/mobile-malware-threats-to-rise
    -in-2013/
    [11]"Google Play Market," https://play.google.com/store
    [12]"JD-GUI," http://java.decompiler.free.fr/?q=jdgui
    [13]Lookout Reports. " State of Mobile Security 2012," https://www.lookout.com/
    resources/reports/state-of-mobile-security-2012
    [14]MobilePaymentsToday.com. "Report: fraud threat to mobile payments to grow in 2013," http://www.mobilepaymentstoday.com/article/205561/Report-fraud
    -threat-to-mobile-payments-to-grow-in-2013
    [15]PCWorld "Smishing Attacks Are on the Rise," http://www.pcworld.com/
    article/254979/smishing_attacks_are_on_the_rise.html, 2012.
    [16]"ProGuard," http://developer.android.com/intl/zh-tw/tools/help/proguard.html
    [17]Symantec.com, "Anatomy of a SMSishing Attack," http://www.symantec.com/
    connect/blogs/anatomy-smsishing-attack
    [18]"TDMiner," http://people.cs.vt.edu/patnaik/software
    [19]TheMobileIndian.com "Researchers uncover SMS-related vulnerability in Android," http://www.themobileindian.com/news/9181_Researchers-uncover
    -SMS-related-vulnerability-in-Android
    [20]The Official Lookout Blog. "Premium SMS Scams," https://blog.lookout.com/
    blog/2012/10/03/avoid-premium-sms-scams/
    [21]"VirusTotal-Free Online Virus, Malwar," https://www.virustotal.com/
    [22]J. Ayres, J. Flannick, J. Gehrke and T. Yiu, "Sequential Pattern Mining using a bitmap representation," in Proceedings of IEEE International Conference on Data Mining (ICDM), pp. 429-435, 2002.
    [23]R. Agrawal and R. Srikant, "Mining Sequential Patterns," in Proceedings of International Conference on Data Engineering (ICDE), pp. 3-14, 1995.
    [24]R. Agrawal and R. Srikant, "Fast algorithms for mining association rules," in Proceedings of the 20th International Conference on Very Large Data Bases, pp. 487-499, 1994.
    [25]B. Coskun and P. Giura, "Mitigating SMS spam by online detection of repetitive near-duplicate messages," in Proceedings of the IEEE International Conference on Communications, 2012, pp. 999–1004.
    [26]E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, "Analyzing Inter-Application Communication in Android," in Proceedings of the 9th Annual International Conference on Mobile Systems, Applications, and Services, 2011.
    [27]P. P. Chan, L. C. Hui, and S. M. Yiu."Droidchecker: analyzing android applications forcapability leak," in Proceedings of the 5th ACM conference on Security and Privacy in Wireless and Mobile Networks, 2012.
    [28]E. Erturk, "Two Trends in Mobile Malware: Financial Motives and Transitioning from Static to Dynamic Analysis," in International Journal of Intelligent Computing Research (IJICR), Volume 3, Issues 3/4, Sep/Dec 2012.
    [29]A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A Survey of Mobile Malware in the Wild," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011.
    [30]K. Y. Huang, and C. H. Chang, "Efficient Mining of Frequent Episodes from Complex Sequences," in Journal of Information Systems, Vol. 33, pp. 96-114, 2008.
    [31]K. Hamandi A. Chehab I. H. Elhajj A. Kayssi, "Android SMS Malware: Vulnerability and Mitigation," in Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013.
    [32]J. Han, J. Pei and Y. Yin, "Mining frequent patterns without candidate generation," in Proceedings of the ACM-SIGMOD International Conference on Management of Data, pp. 1-12, 2000.
    [33]S. H. Lee and S. H. Jin "Warning System for Detecting Malicious Applications on Android System," in International Journal of Computer and Communication Engineering, Vol. 2, No. 3, May 2013.
    [34]S. Laxman, P. S. Sastry, and K. P. Unnikrishnan, "A Fast Algorithm for Finding Frequent Episodes in Event Streams," in Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 410-419, 2007.
    [35]H. Mannila, H. Toivonen, A. I. Verkamo, "Discovery of Frequent Episodes in Event Sequences," Data Mining and Knowledge Discovery, 1997;1:259–289.
    [36]V. B. Mohata1, D. M. Dakhane, R. L. Pardhi, "Mobile Malware Detection Techniques," in International Journal of Computer Science & Engineering Technology (IJCSET), Apr 2013.
    [37]M. T. Nuruzzaman, C. Lee, D. Choi, "Independent and personal SMS spam filtering," in Proceedings of the IEEE 11th International Conference on Computer and Information Technology, 2011.
    [38]D. Patnaik, P. Butler, N. Ramakrishnan, L. Parida, B. J. Keller, and A. Hanauer, "Experiences with Mining Temporal Event Sequences from Electroinic Medical Records," in Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 360-368, 2011.
    [39]J. Pei, J. Han, B. Mortazavi-Asl. J. Wang, H. Pinto, Q. Chen, U. Dayal and M. C. Hsu, "PrefixSpan: Mining Sequential Patterns Efficiently by Prefix-Projected Pattern Growth," in Proceedings of International Conference on Data Engineering (ICDE), pp. 215-224, 2001.
    [40]K. Sharma, T.Dand, T. Oh and W. Stackpole, "Malware Analysis for Android Operating," in Proceedings of 8th annual symposium on information assurance (ASIA), 2013.
    [41]N. Tatti, and J. Vreeken, "The Long and the Short of It: Summarizing Event Sequences with Serial Episodes," in Proceedings of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2012.
    [42]A. K. Uysal, S. Gunal, S. Ergin, E. Sora Gunal, "A novel framework for SMS spam filtering," in Proceedings of the IEEE International Symposium on Innovations in Intelligent Systems and Applications, Trabzon, Turkiye, 2012.
    [43]A. K. Uysal, S. Gunal, S. Ergin, and E. Sora Gunal, "Detection of SMS spam messages on mobile phones," in Proceedings of the IEEE 20th Signal Processing and Communications Applications Conference, 2012.
    [44]K. Yadav, S.K. Saha, P. Kumaraguru, R. Kumra, "Take Control of Your SMSes: Designing an Usable Spam SMS Filtering System," in Proceedings of the IEEE 13th International Conference on Mobile Data Management (MDM), 2012.
    [45]C. Yang, V. Yegneswaran, P. Porras, G. Gu, "POSTER: Detecting money-stealing apps in alternative Android markets," in Proceedings of the 2012 ACM conference on Computer and communications security (CCS), 2012.
    [46]Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang. "Appintent: Analyzing sensitive data transmission in android for privacy leakage detection, " in Proceedings of the 2013 ACM conference on Computer and communications security (CCS), 2013.
    [47]Y. Zhou, X. Jiang, "Dissecting android malware: Characterization and evolution," in Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, pp. 95–109, 2012.

    無法下載圖示 全文公開日期 2019/01/23 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE