Detailed Information on Publication Record
2022
A Longitudinal Study of Cryptographic API: a Decade of Android Malware
JANOVSKÝ, Adam, Davide MAIORCA, Dominik MACKO, Václav MATYÁŠ, Giorgio GIACINTO et. al.Basic information
Original name
A Longitudinal Study of Cryptographic API: a Decade of Android Malware
Name in Czech
Longitudální studie kryptografického API: Dékáda malwaru na platformě Android
Authors
JANOVSKÝ, Adam (203 Czech Republic, guarantor, belonging to the institution), Davide MAIORCA (380 Italy), Dominik MACKO (703 Slovakia, belonging to the institution), Václav MATYÁŠ (203 Czech Republic, belonging to the institution) and Giorgio GIACINTO (380 Italy)
Edition
Portugal, Proceedings of the 19th International Conference on Security and Cryptography, p. 121-133, 13 pp. 2022
Publisher
SCITEPRESS
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
Portugal
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
printed version "print"
RIV identification code
RIV/00216224:14330/22:00126229
Organization unit
Faculty of Informatics
ISBN
978-989-758-590-6
ISSN
UT WoS
000853004900010
Keywords in English
Cryptographic API; Malware; Android; Malware Detection
Tags
International impact, Reviewed
Změněno: 14/5/2024 12:44, RNDr. Pavel Šmerk, Ph.D.
Abstract
V originále
Cryptography has been extensively used in Android applications to guarantee secure communications, conceal critical data from reverse engineering, or ensure mobile users’ privacy. Various system-based and third-party libraries for Android provide cryptographic functionalities, and previous works mainly explored the misuse of cryptographic API in benign applications. However, the role of cryptographic API has not yet been explored in Android malware. This paper performs a comprehensive, longitudinal analysis of cryptographic API in Android malware. In particular, we analyzed 603937 Android applications (half of them malicious, half benign) released between 2012 and 2020, gathering more than 1 million cryptographic API expressions. Our results reveal intriguing trends and insights on how and why cryptography is employed in Android malware. For instance, we point out the widespread use of weak hash functions and the late transition from insecure DES to AES. Additionally, we show that cryptography-related characteristics can help to improve the performance of learning-based systems in detecting malicious applications.
Links
GA20-03426S, research and development project |
| ||
MUNI/A/1076/2019, interní kód MU |
|