Next Article in Journal
Temporomandibular Disorders and Bruxism in Patients Attending a Tinnitus Clinic
Previous Article in Journal
Reality-Virtuality Technologies in the Field of Materials Science and Engineering
Previous Article in Special Issue
Predictors of Employees’ Mobile Security Practice: An Analysis of Personal and Work-Related Variables
Article

Evaluation of Survivability of the Automatically Obfuscated Android Malware

Information Systems Security and Assurance Management, Concordia University of Edmonton, Edmonton, AB T5B 4E4, Canada
*
Author to whom correspondence should be addressed.
Academic Editor: Gianluca Lax
Appl. Sci. 2022, 12(10), 4969; https://doi.org/10.3390/app12104969
Received: 8 April 2022 / Revised: 5 May 2022 / Accepted: 8 May 2022 / Published: 14 May 2022
(This article belongs to the Collection Innovation in Information Security)
Malware is a growing threat to all mobile platforms and hundreds of new malicious applications are being detected every day. At the same time, the development of automated software obfuscation techniques allows for the easy production of new malware variants even by attackers with entry-level programming skills. Such obfuscation techniques can evade the signature-based mechanism implemented in current antimalware technology. This paper presents the results of a study that examined how automated obfuscation techniques affect malicious and benign applications by two widely used malware detection approaches, namely static and dynamic analyses. The research explored 5000 samples of malware and benign programs and evaluated the impact of automated obfuscation on Android applications. The experimental results indicated that (1) up to 73% of the reviewed applications “survived” the automated obfuscation; (2) automated obfuscation reduced the detection ratio to 65–85% depending on the obfuscation method used. These findings call for a more active use of advanced malware detection methods in commonly used antivirus platforms. View Full-Text
Keywords: malware; software obfuscation; static analysis; dynamic analysis; malware detection malware; software obfuscation; static analysis; dynamic analysis; malware detection
Show Figures

Figure 1

MDPI and ACS Style

Patel, H.; Patel, D.; Ahluwalia, J.; Kapoor, V.; Narasimhan, K.; Singh, H.; Kaur, H.; Reddy, G.H.; Peruboina, S.S.; Butakov, S. Evaluation of Survivability of the Automatically Obfuscated Android Malware. Appl. Sci. 2022, 12, 4969. https://doi.org/10.3390/app12104969

AMA Style

Patel H, Patel D, Ahluwalia J, Kapoor V, Narasimhan K, Singh H, Kaur H, Reddy GH, Peruboina SS, Butakov S. Evaluation of Survivability of the Automatically Obfuscated Android Malware. Applied Sciences. 2022; 12(10):4969. https://doi.org/10.3390/app12104969

Chicago/Turabian Style

Patel, Himanshu, Deep Patel, Jaspreet Ahluwalia, Vaishali Kapoor, Karthik Narasimhan, Harmanpreet Singh, Harmanjot Kaur, Gadi H. Reddy, Sai S. Peruboina, and Sergey Butakov. 2022. "Evaluation of Survivability of the Automatically Obfuscated Android Malware" Applied Sciences 12, no. 10: 4969. https://doi.org/10.3390/app12104969

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop