SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Viruses on mobile platforms:
Why we don't/don't we have viruses on Android?
Jimmy Shah
Mobile Security Researcher
2 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• Virus
– Self-replicating program
• May inject itself into clean programs
• May have destructive or visible payload
• Worm
– Self-replicating program that doesn't infect files
– E.g. Internet, MMS or Bluetooth worms
• Trojan
– Non-replicating, program that pretends to be another
• May have destructive or visible payload
Definitions
Viruses on mobile platforms: Why we don't/don't we have viruses on Android?3
Viruses on Mobile Platforms
PalmOS
Windows Mobile
Symbian
Android
4 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• 2000
– Palm/Phage
• File infector
– Overwriter
• Code resource replaced with virus code
– Potentially smaller programs
Palm OS
Credit: Niels Heidenreich
Creative Commons Attribution licensed.
Viruses on mobile platforms: Why we don't/don't we have viruses on Android?5
Viruses on Mobile Platforms
PalmOS
Windows Mobile
Symbian
Android
6 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• 2007
– WinCE/Duts.1536
• Injected itself into all apps in current directory
– Asked for permission before running
Windows Mobile
7 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• 2009
– WinCE/PMCryptic
• Polymorphic
• Developed with and only ran within emulator
– Author didn't understand how to do self-modifying code on ARM
Windows Mobile
Viruses on mobile platforms: Why we don't/don't we have viruses on Android?8
Viruses on Mobile Platforms
PalmOS
Windows Mobile
Symbian
Android
9 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• 2004
– SymbOs/Cabir
• First worm/malware for Symbian
• 2005
– SymbOS/Lasco.A
• File infector
– Infected SIS installation files
Symbian
Viruses on mobile platforms: Why we don't/don't we have viruses on Android?10
Viruses on Mobile Platforms
PalmOS
Windows Mobile
Symbian
Android
11 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• 2010
– Android/Fakeplayer.A
• First trojan
• 20??
– Android/??????
• File infector
– Haven't seen one yet
Android
Viruses on mobile platforms: Why we don't/don't we have viruses on Android?12
Android:
What do attackers need to build a virus?
13 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• Ability to replicate
• Making copies of itself is easy enough
Android – What do attackers need to build a virus?
Replication Infection Evasion
Tool Useful functions
File managers Move, copy,delete files
File transfer programs Network copy,delete files
14 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
Android – What do attackers need to build a virus?
Replication Infection Evasion
• Ability to inject code into clean apps
– This has been done manually in numerous trojans:
– Automating this saves them work and makes actual viruses
Android/Geinimi Android/Jmsonez
Android/PJApp Android/SteamyScr
Android/HippoSMS Android/GoldDream
Android/J.SMSHider Android/DroidKungfu
15 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
Android – What do attackers need to build a virus?
Replication Infection Evasion
• Locate code
– Apps are in APKs.
• APKs are zip files
• App code is in classes.dex files.
• Modify Dex files
– Format is documented
• http://source.android.com/tech/dalvik/dex-format.html
– Multiple tools
Tool Use
Smali/baksmalil Assemnler/disassembler for DEX files.
apktool Unpack/decode APK: resources, smali code, AndroidManifest.xml
16 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• Dex files are difficult to modify?
• Disassembling easy with baksmali
– Used by Privacy Blocker to mod apps
» Memory issues
Attackers – Ability to inject code into clean apps
Replication Infection Evasion
17 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• Modifying AndroidManifest.xml can redirect execution
– Register for intents
Attackers – Ability to inject code into clean apps
Replication Infection Evasion
Intent Function
android.intent.action.BOOT_COMPLETED Start immediately after system finishes booting
android.permission.RECEIVE_SMS Run when SMS received
android.intent.action.PHONE_STATE Phone state chages; specifically ringing
android.net.wifi.WIFI_STATE_CHANGED Wifi state changes; specifically enabled
18 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• Ability to evade detection
• Encryption
– Simple obfuscations and ciphers
– Complex and well known encryption algorithms
• Pretending to be clean apps
– Infected apps
– “Legitimate” apps (e.g. Adult entertainment, IM,Web browsers,
games)
• Reduce/remove security
– Disable security checks
– Remove/disable security & anti-malware software
Android – What do attackers need to build a virus?
Replication Infection Evasion
19 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
• Ability to evade detection
• Encryption
– Simple obfuscations and ciphers
– Complex and well known encryption algorithms
• Pretending to be clean apps
– Infected apps
– “Legitimate” apps (e.g. Adult entertainment, IM,Web browsers,
games)
• Reduce/remove security
– Disable security checks
– Remove/disable security & anti-malware software
Android – What do attackers need to build a virus?
Replication Infection Evasion
20 Viruses on mobile platforms: Why we don't/don't we have viruses on Android?
Questions?
Viruses on mobile platforms  why we don't/don't we have viruses on android_

Mais conteúdo relacionado

Mais procurados

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 
Mobilination Ntymoshyk Personal Mobile Security Final Public
Mobilination Ntymoshyk Personal Mobile Security  Final PublicMobilination Ntymoshyk Personal Mobile Security  Final Public
Mobilination Ntymoshyk Personal Mobile Security Final Public
Tjylen Veselyj
 

Mais procurados (20)

Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
1. Mobile Application (In)security
1. Mobile Application (In)security1. Mobile Application (In)security
1. Mobile Application (In)security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Steps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and ConsumersSteps For Protecting Your Mobile Life for Enterprises and Consumers
Steps For Protecting Your Mobile Life for Enterprises and Consumers
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Computer virus and worms
Computer virus and wormsComputer virus and worms
Computer virus and worms
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Mobilination Ntymoshyk Personal Mobile Security Final Public
Mobilination Ntymoshyk Personal Mobile Security  Final PublicMobilination Ntymoshyk Personal Mobile Security  Final Public
Mobilination Ntymoshyk Personal Mobile Security Final Public
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Computer Virus 2017
Computer Virus 2017Computer Virus 2017
Computer Virus 2017
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
CNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOSCNIT 128 Ch 3: iOS
CNIT 128 Ch 3: iOS
 
CNIT 128 5: Mobile malware
CNIT 128 5: Mobile malwareCNIT 128 5: Mobile malware
CNIT 128 5: Mobile malware
 
computer Virus
computer Virus computer Virus
computer Virus
 
viruses and other malicious code prevent | characteristics
viruses and other malicious code prevent | characteristicsviruses and other malicious code prevent | characteristics
viruses and other malicious code prevent | characteristics
 
Virus
VirusVirus
Virus
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 

Destaque

Attacking IPv6 Implementation Using Fragmentation
Attacking IPv6 Implementation Using FragmentationAttacking IPv6 Implementation Using Fragmentation
Attacking IPv6 Implementation Using Fragmentation
michelemanzotti
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
Stonesoft
 
2600 av evasion_deuce
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuce
Db Cooper
 

Destaque (15)

Attacking IPv6 Implementation Using Fragmentation
Attacking IPv6 Implementation Using FragmentationAttacking IPv6 Implementation Using Fragmentation
Attacking IPv6 Implementation Using Fragmentation
 
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Radware DefensePipe:  Cloud-Based Attack Mitigation SolutionRadware DefensePipe:  Cloud-Based Attack Mitigation Solution
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
 
XSS Primer - Noob to Pro in 1 hour
XSS Primer - Noob to Pro in 1 hourXSS Primer - Noob to Pro in 1 hour
XSS Primer - Noob to Pro in 1 hour
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
THE VEIL FRAMEWORK
THE  VEIL FRAMEWORKTHE  VEIL FRAMEWORK
THE VEIL FRAMEWORK
 
Veil Evasion and Client Side Attacks
Veil Evasion and Client Side AttacksVeil Evasion and Client Side Attacks
Veil Evasion and Client Side Attacks
 
Polygon filling
Polygon fillingPolygon filling
Polygon filling
 
2600 av evasion_deuce
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuce
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
Ever Present Persistence - Established Footholds Seen in the Wild
Ever Present Persistence - Established Footholds Seen in the WildEver Present Persistence - Established Footholds Seen in the Wild
Ever Present Persistence - Established Footholds Seen in the Wild
 
The Art of AV Evasion - Or Lack Thereof
The Art of AV Evasion - Or Lack ThereofThe Art of AV Evasion - Or Lack Thereof
The Art of AV Evasion - Or Lack Thereof
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
FortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZFortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZ
 
Change Management PPT Slides
Change Management PPT SlidesChange Management PPT Slides
Change Management PPT Slides
 

Semelhante a Viruses on mobile platforms why we don't/don't we have viruses on android_

I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
Harsimran Walia
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
Harsimran Walia
 

Semelhante a Viruses on mobile platforms why we don't/don't we have viruses on android_ (20)

Code protection
Code protectionCode protection
Code protection
 
android Security
android Security android Security
android Security
 
I haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaperI haz you and pwn your maal whitepaper
I haz you and pwn your maal whitepaper
 
Android security
Android securityAndroid security
Android security
 
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnovDetecting Intrusions and Malware - Eric Vanderburg - JurInnov
Detecting Intrusions and Malware - Eric Vanderburg - JurInnov
 
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
5 Key Ways to Incorporate Security Protection into your Organization’s Mobile...
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Android security
Android securityAndroid security
Android security
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 

Mais de Jimmy Shah

Mobile malware analysis with the a.r.e. vm
Mobile malware analysis with the a.r.e. vmMobile malware analysis with the a.r.e. vm
Mobile malware analysis with the a.r.e. vm
Jimmy Shah
 

Mais de Jimmy Shah (7)

Brick all the internet of things!(with notes)
Brick all the internet of things!(with notes)Brick all the internet of things!(with notes)
Brick all the internet of things!(with notes)
 
There's no S(ecurity) in IoT: This is why we can't sleep
There's no S(ecurity) in IoT: This is why we can't sleepThere's no S(ecurity) in IoT: This is why we can't sleep
There's no S(ecurity) in IoT: This is why we can't sleep
 
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTBYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
 
Solar Powered Parking Meters - An IoT thought experiment
Solar Powered Parking Meters - An IoT thought experimentSolar Powered Parking Meters - An IoT thought experiment
Solar Powered Parking Meters - An IoT thought experiment
 
Mobile malware analysis with the a.r.e. vm
Mobile malware analysis with the a.r.e. vmMobile malware analysis with the a.r.e. vm
Mobile malware analysis with the a.r.e. vm
 
Mobile malware heuristics the path from 'eh' to pretty good'
Mobile malware heuristics  the path from 'eh' to pretty good'Mobile malware heuristics  the path from 'eh' to pretty good'
Mobile malware heuristics the path from 'eh' to pretty good'
 
Isn't it all just SMS-sending trojans?: Real Advances in Android Malware
Isn't it all just SMS-sending trojans?: Real Advances in Android MalwareIsn't it all just SMS-sending trojans?: Real Advances in Android Malware
Isn't it all just SMS-sending trojans?: Real Advances in Android Malware
 

Último

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Último (6)

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
 

Viruses on mobile platforms why we don't/don't we have viruses on android_

  • 1. Viruses on mobile platforms: Why we don't/don't we have viruses on Android? Jimmy Shah Mobile Security Researcher
  • 2. 2 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • Virus – Self-replicating program • May inject itself into clean programs • May have destructive or visible payload • Worm – Self-replicating program that doesn't infect files – E.g. Internet, MMS or Bluetooth worms • Trojan – Non-replicating, program that pretends to be another • May have destructive or visible payload Definitions
  • 3. Viruses on mobile platforms: Why we don't/don't we have viruses on Android?3 Viruses on Mobile Platforms PalmOS Windows Mobile Symbian Android
  • 4. 4 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • 2000 – Palm/Phage • File infector – Overwriter • Code resource replaced with virus code – Potentially smaller programs Palm OS Credit: Niels Heidenreich Creative Commons Attribution licensed.
  • 5. Viruses on mobile platforms: Why we don't/don't we have viruses on Android?5 Viruses on Mobile Platforms PalmOS Windows Mobile Symbian Android
  • 6. 6 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • 2007 – WinCE/Duts.1536 • Injected itself into all apps in current directory – Asked for permission before running Windows Mobile
  • 7. 7 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • 2009 – WinCE/PMCryptic • Polymorphic • Developed with and only ran within emulator – Author didn't understand how to do self-modifying code on ARM Windows Mobile
  • 8. Viruses on mobile platforms: Why we don't/don't we have viruses on Android?8 Viruses on Mobile Platforms PalmOS Windows Mobile Symbian Android
  • 9. 9 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • 2004 – SymbOs/Cabir • First worm/malware for Symbian • 2005 – SymbOS/Lasco.A • File infector – Infected SIS installation files Symbian
  • 10. Viruses on mobile platforms: Why we don't/don't we have viruses on Android?10 Viruses on Mobile Platforms PalmOS Windows Mobile Symbian Android
  • 11. 11 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • 2010 – Android/Fakeplayer.A • First trojan • 20?? – Android/?????? • File infector – Haven't seen one yet Android
  • 12. Viruses on mobile platforms: Why we don't/don't we have viruses on Android?12 Android: What do attackers need to build a virus?
  • 13. 13 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • Ability to replicate • Making copies of itself is easy enough Android – What do attackers need to build a virus? Replication Infection Evasion Tool Useful functions File managers Move, copy,delete files File transfer programs Network copy,delete files
  • 14. 14 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? Android – What do attackers need to build a virus? Replication Infection Evasion • Ability to inject code into clean apps – This has been done manually in numerous trojans: – Automating this saves them work and makes actual viruses Android/Geinimi Android/Jmsonez Android/PJApp Android/SteamyScr Android/HippoSMS Android/GoldDream Android/J.SMSHider Android/DroidKungfu
  • 15. 15 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? Android – What do attackers need to build a virus? Replication Infection Evasion • Locate code – Apps are in APKs. • APKs are zip files • App code is in classes.dex files. • Modify Dex files – Format is documented • http://source.android.com/tech/dalvik/dex-format.html – Multiple tools Tool Use Smali/baksmalil Assemnler/disassembler for DEX files. apktool Unpack/decode APK: resources, smali code, AndroidManifest.xml
  • 16. 16 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • Dex files are difficult to modify? • Disassembling easy with baksmali – Used by Privacy Blocker to mod apps » Memory issues Attackers – Ability to inject code into clean apps Replication Infection Evasion
  • 17. 17 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • Modifying AndroidManifest.xml can redirect execution – Register for intents Attackers – Ability to inject code into clean apps Replication Infection Evasion Intent Function android.intent.action.BOOT_COMPLETED Start immediately after system finishes booting android.permission.RECEIVE_SMS Run when SMS received android.intent.action.PHONE_STATE Phone state chages; specifically ringing android.net.wifi.WIFI_STATE_CHANGED Wifi state changes; specifically enabled
  • 18. 18 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • Ability to evade detection • Encryption – Simple obfuscations and ciphers – Complex and well known encryption algorithms • Pretending to be clean apps – Infected apps – “Legitimate” apps (e.g. Adult entertainment, IM,Web browsers, games) • Reduce/remove security – Disable security checks – Remove/disable security & anti-malware software Android – What do attackers need to build a virus? Replication Infection Evasion
  • 19. 19 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? • Ability to evade detection • Encryption – Simple obfuscations and ciphers – Complex and well known encryption algorithms • Pretending to be clean apps – Infected apps – “Legitimate” apps (e.g. Adult entertainment, IM,Web browsers, games) • Reduce/remove security – Disable security checks – Remove/disable security & anti-malware software Android – What do attackers need to build a virus? Replication Infection Evasion
  • 20. 20 Viruses on mobile platforms: Why we don't/don't we have viruses on Android? Questions?