Design and Analysis of Push Notification-Based Malware on Android

Joint Authors

Kim, Hyoungshick
Hyun, Sangwon
Cho, Junsung
Cho, Geumhwan

Source

Security and Communication Networks

Issue

Vol. 2018, Issue 2018 (31 Dec. 2018), pp.1-12, 12 p.

Publisher

Hindawi Publishing Corporation

Publication Date

2018-07-09

Country of Publication

Egypt

No. of Pages

12

Main Subjects

Information Technology and Computer Science

Abstract EN

Establishing secret command and control (C&C) channels from attackers is important in malware design.

This paper presents design and analysis of malware architecture exploiting push notification services as C&C channels.

The key feature of the push notification-based malware design is remote triggering, which allows attackers to trigger and execute their malware by push notifications.

The use of push notification services as covert channels makes it difficult to distinguish this type of malware from other normal applications also using the same services.

We implemented a backdoor prototype on Android devices as a proof-of-concept of the push notification-based malware and evaluated its stealthiness and feasibility.

Our malware implementation effectively evaded the existing malware analysis tools such as 55 antimalware scanners from VirusTotal and SandDroid.

In addition, our backdoor implementation successfully cracked about 98% of all the tested unlock secrets (either PINs or unlock patterns) in 5 seconds with only a fraction (less than 0.01%) of the total power consumption of the device.

Finally, we proposed several defense strategies to mitigate push notification-based malware by carefully analyzing its attack process.

Our defense strategies include filtering subscription requests for push notifications from suspicious applications, providing centralized management and access control of registration tokens of applications, detecting malicious push messages by analyzing message contents and characteristic patterns demonstrated by malicious push messages, and detecting malware by analyzing the behaviors of applications after receiving push messages.

American Psychological Association (APA)

Hyun, Sangwon& Cho, Junsung& Cho, Geumhwan& Kim, Hyoungshick. 2018. Design and Analysis of Push Notification-Based Malware on Android. Security and Communication Networks،Vol. 2018, no. 2018, pp.1-12.
https://search.emarefa.net/detail/BIM-1214447

Modern Language Association (MLA)

Hyun, Sangwon…[et al.]. Design and Analysis of Push Notification-Based Malware on Android. Security and Communication Networks No. 2018 (2018), pp.1-12.
https://search.emarefa.net/detail/BIM-1214447

American Medical Association (AMA)

Hyun, Sangwon& Cho, Junsung& Cho, Geumhwan& Kim, Hyoungshick. Design and Analysis of Push Notification-Based Malware on Android. Security and Communication Networks. 2018. Vol. 2018, no. 2018, pp.1-12.
https://search.emarefa.net/detail/BIM-1214447

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references

Record ID

BIM-1214447