Easy Bypass: Android Antiviral Products

Thursday, May 30, 2013 @ 07:05 PM gHale


You know your product has hit big time when universities spend their research and development time trying to overcome problems affecting your system.

That is exactly what has happened with the popular Android.

Northwestern University researchers, working with partners from North Carolina State University, tested 10 of the most popular antiviral products for Android and found an attacker could easily circumnavigate each by even the most simple obfuscation techniques.

RELATED STORIES
Galaxy S4 Bootloader Hackable
Android Malware Threats on Rise
Security App Warns Android Users
Spyware in Font Apps on Google Play

“The results are quite surprising,” said Yan Chen, associate professor of electrical engineering and computer science at Northwestern’s McCormick School of Engineering and Applied Science. “Many of these products are blind to even trivial transformation attacks not involving code-level changes — operations a teenager could perform.”

The researchers began by testing six known viruses on the fully functional versions of 10 of the most popular Android antiviral products, most of which millions of users have downloaded.

Using a tool they developed called DroidChameleon, the researchers then applied common techniques — such as simple switches in a virus’s binary code or file name, or running a command on the virus to repackage or reassemble it — to transform the viruses into slightly altered but equally damaging versions. They then tested dozens of transformed viruses on the antiviral products, often slipping through the software unnoticed.

All of the antiviral products did not stop the virus, the researchers found, though their susceptibility to the transformed attacks varied.

The products’ shortcomings are due to their use of overly simple content-based signatures, special patterns the products use to screen for viruses, the researchers said. Instead, the researchers suggested, the products should use a more sophisticated static analysis to accurately seek out transformed attacks. Only one of the 10 tested tools currently utilizes a static analysis system.

The researchers chose to study Android products because it is the most commonly used operating system in the United States and worldwide, and because its open platform enabled the researchers to easily conduct analyses. They emphasized, however, other operating systems are not necessarily more secure from virus attacks.

Antiviral products are improving. Last year, 45 percent of signatures could end up evaded with trivial transformations. This year, the number dropped to 16 percent.

“Still, these products are not as robust and effective as they must be to stop malware writers,” Chen said. “This is a cat-and-mouse game.”

The researchers wrote a paper about the research entitiled, “Evaluating Android Anti-Malware Against Transformation Attacks.”



Leave a Reply

You must be logged in to post a comment.