Communication publiée dans un ouvrage (Colloques, congrès, conférences scientifiques et actes)
TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs
SAMHI, Jordan; BISSYANDE, Tegawendé François D Assise; KLEIN, Jacques
2022In 19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022)
Peer reviewed
 

Documents


Texte intégral
paper.pdf
Preprint Auteur (541.53 kB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
Dataset; Android Security; Logic bomb
Résumé :
[en] Many Android apps analyzers rely, among other techniques, on dynamic analysis to monitor their runtime behavior and detect potential security threats. However, malicious developers use subtle, though efficient, techniques to bypass dynamic analyzers. Logic bombs are examples of popular techniques where the malicious code is triggered only under specific circumstances, challenging comprehensive dynamic analyses. The research community has proposed various approaches and tools to detect logic bombs. Unfortunately, rigorous assessment and fair comparison of state-of-the-art techniques are impossible due to the lack of ground truth. In this paper, we present TriggerZoo, a new dataset of 406 Android apps containing logic bombs and benign trigger-based behavior that we release only to the research community using authenticated API. These apps are real-world apps from Google Play that have been automatically infected by our tool AndroBomb. The injected pieces of code implementing the logic bombs cover a large pallet of realistic logic bomb types that we have manually characterized from a set of real logic bombs. Researchers can exploit this dataset as ground truth to assess their approaches and provide comparisons against other tools.
Centre de recherche :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Trustworthy Software Engineering (TruX)
Disciplines :
Sciences informatiques
Auteur, co-auteur :
SAMHI, Jordan  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
BISSYANDE, Tegawendé François D Assise  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
KLEIN, Jacques  ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX
Co-auteurs externes :
no
Langue du document :
Anglais
Titre :
TriggerZoo: A Dataset of Android Applications Automatically Infected with Logic Bombs
Date de publication/diffusion :
23 mai 2022
Nom de la manifestation :
19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022)
Lieu de la manifestation :
Pittsburgh, Etats-Unis
Date de la manifestation :
From 23/05/2022 to 24/05/2022
Manifestation à portée :
International
Titre de l'ouvrage principal :
19th International Conference on Mining Software Repositories, Data Showcase, (MSR 2022)
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Projet FnR :
FNR14596679 - Dissecting Android Applications Using Static Analysis, 2020 (01/03/2020-31/10/2023) - Jordan Samhi
Organisme subsidiant :
FNR - Fonds National de la Recherche
Disponible sur ORBilu :
depuis le 09 mars 2022

Statistiques


Nombre de vues
303 (dont 22 Unilu)
Nombre de téléchargements
103 (dont 5 Unilu)

citations Scopus®
 
5
citations Scopus®
sans auto-citations
5
OpenCitations
 
0
citations OpenAlex
 
4

Bibliographie


Publications similaires



Contacter ORBilu