论文标题

睫毛膏:一种新颖的攻击,利用Android虚拟化

Mascara: A Novel Attack Leveraging Android Virtualization

论文作者

Alecci, Marco, Cestaro, Riccardo, Conti, Mauro, Kanishka, Ketan, Losiouk, Eleonora

论文摘要

Android虚拟化使应用程序能够创建虚拟环境,在该环境中可以运行其他应用程序。恶意开发人员最初旨在克服移动应用程序维度的局限性,很快就开始利用这种技术来设计新颖的攻击。结果,研究人员提出了新的防御机制,使应用程序能够检测它们是否在虚拟环境中运行。在本文中,我们提出了睫毛膏,这是第一次以新的方式利用虚拟化技术的攻击,实现了针对任何Android应用程序的全部可行性,并证明了现有对策的无效性。睫毛膏是由一个恶意应用程序执行的,看起来像受害者应用程序的附加组件。至于任何其他附加组件,我们的恶意效果都可以作为标准的Android应用程序安装,但是在安装后,它会针对受害者应用程序启动睫毛膏。恶意附加组件是由Mascarer生成的,Mascarer是我们设计和开发的框架,以使整个过程自动化。关于睫毛膏,我们评估了其针对三个流行应用程序(即电报,亚马逊音乐和Alamo)的有效性,以及绕过虚拟环境检测的现有机制的能力。我们通过测量虚拟化技术在运行时引入的间接费用以及Mascarer所需的汇编时间来生成100个恶意附加组件(即小于10秒)所需的汇编时间来分析攻击的效率。最后,我们设计了一种强大的方法,该方法通过检查Android运行时(ART)环境中ArtMethod数据结构的字段值来检测虚拟环境。

Android virtualization enables an app to create a virtual environment, in which other apps can run. Originally designed to overcome the limitations of mobile apps dimensions, malicious developers soon started exploiting this technique to design novel attacks. As a consequence, researchers proposed new defence mechanisms that enable apps to detect whether they are running in a virtual environment. In this paper, we propose Mascara, the first attack that exploits the virtualization technique in a new way, achieving the full feasibility against any Android app and proving the ineffectiveness of existing countermeasures. Mascara is executed by a malicious app, that looks like the add-on of the victim app. As for any other add-on, our malicious one can be installed as a standard Android app, but, after the installation, it launches Mascara against the victim app. The malicious add-on is generated by Mascarer, the framework we designed and developed to automate the whole process. Concerning Mascara, we evaluated its effectiveness against three popular apps (i.e., Telegram, Amazon Music and Alamo) and its capability to bypass existing mechanisms for virtual environments detection. We analyzed the efficiency of our attack by measuring the overhead introduced at runtime by the virtualization technique and the compilation time required by Mascarer to generate 100 malicious add-ons (i.e., less than 10 sec). Finally, we designed a robust approach that detects virtual environments by inspecting the fields values of ArtMethod data structures in the Android Runtime (ART) environment.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源