| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Traditional anti,virus works by detecting sequences of bytes.
Many evasion techniques manipulate data and code in very
minor ways that, while not affecting the functionality of the
program, change the sequences of bytes within it. An alternative approach is to identify programs based on their control
flow graphs (CFGs). Using the Baksmali tool as a base, I’ve
added code to parse the CFG for each method, read in a
signature file, and run different comparison algorithms to
effectively make a CFG based virus scanner. An algorithm for
node,by,node matching has been designed and implemented
specifically for this project. The algorithms, efficacy, and
implementation of this tool will be discussed.Some technical
background will be helpful. However, in addition to the control
flow graph isomorphism algorithm, this talk will attempt to
cover the necessary background knowledge including traditional anti,virus methods, Android APK structure and code,
disassembly, basic blocks, and control flow graphs.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast