论文标题
Triggerzoo:Android应用程序的数据集自动感染了逻辑炸弹
TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs
论文作者
论文摘要
除其他技术外,许多Android应用分析仪依靠动态分析来监视其运行时行为并检测潜在的安全威胁。但是,恶意开发人员使用微妙但有效的技术来绕过动态分析仪。逻辑炸弹是流行技术的示例,其中仅在特定情况下触发恶意代码,从而挑战了全面的动态分析。研究界提出了各种检测逻辑炸弹的方法和工具。不幸的是,由于缺乏地面真理,不可能对最新技术进行严格的评估和公平的比较。在本文中,我们介绍了Triggerzoo,这是一个406个Android应用的新数据集,其中包含逻辑炸弹和基于良性触发的行为,我们仅使用身份验证的API向研究社区发布。这些应用程序是来自Google Play的现实世界应用,它们已自动被我们的工具Androbomb感染。实施逻辑炸弹的注入的代码涵盖了我们从一组真实的逻辑炸弹中手动表征的逼真逻辑炸弹类型的大托盘。研究人员可以利用该数据集作为基础真理,以评估其方法并与其他工具进行比较。
Many Android apps analyzers rely, among other techniques, on dynamic analysis to monitor their runtime behavior and detect potential security threats. However, malicious developers use subtle, though efficient, techniques to bypass dynamic analyzers. Logic bombs are examples of popular techniques where the malicious code is triggered only under specific circumstances, challenging comprehensive dynamic analyses. The research community has proposed various approaches and tools to detect logic bombs. Unfortunately, rigorous assessment and fair comparison of state-of-the-art techniques are impossible due to the lack of ground truth. In this paper, we present TriggerZoo, a new dataset of 406 Android apps containing logic bombs and benign trigger-based behavior that we release only to the research community using authenticated API. These apps are real-world apps from Google Play that have been automatically infected by our tool AndroBomb. The injected pieces of code implementing the logic bombs cover a large pallet of realistic logic bomb types that we have manually characterized from a set of real logic bombs. Researchers can exploit this dataset as ground truth to assess their approaches and provide comparisons against other tools.