Communication publiée dans un ouvrage (Colloques, congrès, conférences scientifiques et actes)
Dissecting Android Cryptocurrency Miners
DASHEVSKYI, Stanislav; Zhauniarovich, Yury; GADYATSKAYA, Olga et al.
2020In CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans LA USA, March 2020
Peer reviewed
 

Documents


Texte intégral
miners-preprint.pdf
Preprint Auteur (1.36 MB)
Demander un accès

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Android; cryptocurrency; mining
Résumé :
[en] Cryptojacking applications pose a serious threat to mobile devices. Due to the extensive computations, they deplete the battery fast and can even damage the device. In this work we make a step towards combating this threat. We collected and manually verified a large dataset of Android mining apps. In this paper, we analyze the gathered miners and identify how they work, what are the most popular libraries and APIs used to facilitate their development, and what static features are typical for this class of applications. Further, we analyzed our dataset using VirusTotal. The majority of our samples is considered malicious by at least one VirusTotal scanner, but 16 apps are not detected by any engine; and at least 5 apks were not seen previously by the service. Mining code could be obfuscated or fetched at runtime, and there are many confusing miner-related apps that actually do not mine. Thus, static features alone are not sufficient for miner detection.We have collected a feature set of dynamic metrics both for miners and unrelated benign apps, and built a machine learning-based tool for dynamic detection. Our BrenntDroid tool is able to detect miners with 95% of accuracy on our dataset.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
DASHEVSKYI, Stanislav ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Zhauniarovich, Yury
GADYATSKAYA, Olga ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
PILGUN, Aleksandr  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > PI Mauw
OUHSSAIN, Hamza ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Dissecting Android Cryptocurrency Miners
Date de publication/diffusion :
mars 2020
Nom de la manifestation :
Tenth ACM Conference on Data and Application Security and Privacy
Date de la manifestation :
from 16-03-2020 to 18-03-2020
Manifestation à portée :
International
Titre de l'ouvrage principal :
CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans LA USA, March 2020
Maison d'édition :
ACM, New York, Etats-Unis - New York
ISBN/EAN :
978-1-4503-7107-0
Pagination :
191–202
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Projet FnR :
FNR11289380 - Systematically Exploring Semantic App Models For Android, 2016 (15/11/2016-14/11/2020) - Aleksandr Pilgun
Intitulé du projet de recherche :
Combatting Context-Sensitive Mobile Malware C15/IS/10404933/COMMA
Disponible sur ORBilu :
depuis le 01 janvier 2021

Statistiques


Nombre de vues
260 (dont 4 Unilu)
Nombre de téléchargements
0 (dont 0 Unilu)

citations Scopus®
 
15
citations Scopus®
sans auto-citations
13
OpenCitations
 
6
citations OpenAlex
 
17

Bibliographie


Publications similaires



Contacter ORBilu