论文标题
密码API的纵向研究:十年的Android恶意软件
A Longitudinal Study of Cryptographic API: a Decade of Android Malware
论文作者
论文摘要
密码学已在Android应用程序中广泛使用,以确保安全通信,隐藏关键数据反向工程或确保移动用户的隐私。针对Android的各种基于系统的和第三方的库提供了加密功能,以前的工作主要探讨了在良性应用中滥用加密API。但是,在Android恶意软件中尚未探索加密API的作用。本文对Android恶意软件中的加密API进行了全面的纵向分析。特别是,我们分析了$ 603 \,937美元的Android应用程序(其中一半是恶意,一半的良性)在2012年$至2020美元之间,收集了超过100万个加密API表达式。我们的结果揭示了关于Android恶意软件中如何以及为什么使用密码学的有趣趋势和见解。例如,我们指出弱的哈希功能的广泛使用以及从不安全的des des to aes的后期过渡。此外,我们表明,与密码相关的特征可以帮助提高基于学习的系统的性能在检测恶意应用时。
Cryptography has been extensively used in Android applications to guarantee secure communications, conceal critical data from reverse engineering, or ensure mobile users' privacy. Various system-based and third-party libraries for Android provide cryptographic functionalities, and previous works mainly explored the misuse of cryptographic API in benign applications. However, the role of cryptographic API has not yet been explored in Android malware. This paper performs a comprehensive, longitudinal analysis of cryptographic API in Android malware. In particular, we analyzed $603\,937$ Android applications (half of them malicious, half benign) released between $2012$ and $2020$, gathering more than 1 million cryptographic API expressions. Our results reveal intriguing trends and insights on how and why cryptography is employed in Android malware. For instance, we point out the widespread use of weak hash functions and the late transition from insecure DES to AES. Additionally, we show that cryptography-related characteristics can help to improve the performance of learning-based systems in detecting malicious applications.