Android Malware Source Code Analysis Slides
Android Malware Source Code Analysis Slides
1 / 33
Motivation & Objectives
2 / 33
Dataset
3 / 33
Acquisition & Analysis
Github Searches
01.
Underground Forums 97 Samples
02.
3,538,683 SLOCs
Malware Databases: vx-underground,
03. theZoo, sppen…
Following web search links
04.
4 / 33
Malware Types
RAT 31 Trojan-SMS 3
Spyware 13 Dropper 2
Trojan-Spy 9 Trojan-Backdoor 2
Keylogger 8 Backdoor 1
Trojan-Banker 7 Downloader 1
Rootkit 5 Password-Stealing-Ware 1
Locker 4 Scareware 1
Ransomware 4 Trojan 1
Phishing 3 Trojan-Wiper 1
5 / 33
Malware Tags
Malware Tag No. Malware Samples Malware Tag No. Malware Samples
Spyware 72 Locker 19
Botnet 60 Keylogger 17
Backdoor 44 Mailfinder 12
C2 44 Wiper 12
Billing-Fraud 40 Password-Stealing-Ware 11
Trojan 35 Phishing 9
RAT 34 Encryption-Ransomware 8
Downloader 31 Screen-Locking-Ransomware 8
Elevated-Privilege-Abuse 27 Overlay 7
6 / 33
Samples By Year
7 / 33
Malware Permissions
8 / 33
Malware Capabilities
01 02
Steal Information Control the Device
▪ Upload and List Files ▪ Download and Delete Files
▪ List Installed Apps ▪ Install, Uninstall and Open Apps
▪ Get Tasks ▪ Encrypt and Decrypt Files
▪ Input Capture ▪ Lock the Device
▪ Screenshot ▪ Hide the App Icon
▪ Read SMS ▪ Remote Shell
▪ Read Contacts ▪ Draw Over Other Apps
▪ Camera ▪ Make Phone Calls
9 / 33
VirusTotal Detections By Year
Average: 8.026%
10 / 33
VirusTotal Detections By Type
11 / 33
Code Size
12 / 33
Files By Year
1
2
3
1
14 / 33
SLOCs By Year
1
2
1 3
16 / 33
Functions By Year
1
2
1
3
2
3
Average: 7.33
18 / 33
Programming Languages
1 Backdoor Bootloader-Backdoor 51
2 RAT AhMyth 29
1
3 RAT Arbitrium 20
Average: 8.75
19 / 33
Development Costs
20 / 33
Effort
2 1
1 3
1 3
3 Trojan-Banker Cerberus 30 22 / 33
Team Size
1
2
1 3
24 / 33
Complexity By Values
25 / 33
Complexity By Year
1 Rootkit Adore 8
2 Ransomware SARA 6
1 3 Trojan-Backdoor DarkSilent 4
Average: 2.29
26 / 33
Maintainability By Values
27 / 33
Maintainability By Year
2
3
Average: 48.60
28 / 33
Density of Comments
Average: 14.81%
29 / 33
Android vs
non-specific malware
Code Size, Development Cots, Code Quality
30 / 33
Limitations Conclusions
▪ Non-representative dataset ▪ Increase in code size
○ Few samples ▪ Increase in development costs
○ Collection bias ▪ Decrease in code quality
▪ Estimates, not reality ▪ Larger sizes and costs than
▪ Ever changing malware landscape non-specific malware, fewer quality
▪ UCC-J tool ▪ Inconclusive results
▪ Too early
31 / 33
Future Work
32 / 33
Thanks !
33 / 33