• Deutsch
Login

Open Access

  • Home
  • Search
  • Browse
  • Publish/report a document
  • Help

Refine

Has Fulltext

  • yes (3)

Author

  • Breitinger, Frank (3)
  • O'Shaughnessy, Stephen (2)
  • Luechinger, Engelbert (1)
  • O’Shaughnessy, Stephen (1)
  • Wu, Tina (1)
  • Zhang, Xiaolu (1)

Year of publication

  • 2021 (2)
  • 2020 (1)

Document Type

  • Article (3)

Language

  • English (3)

Institute

  • Fakultät für Angewandte Informatik (3)
  • Institut für Informatik (3)
  • Lehrstuhl für Cybersicherheit (3)

3 search hits

  • 1 to 3
  • 10
  • 20
  • 50
  • 100

Sort by

  • Year
  • Year
  • Title
  • Title
  • Author
  • Author
Android application forensics: a survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations (2021)
Zhang, Xiaolu ; Breitinger, Frank ; Luechinger, Engelbert ; O'Shaughnessy, Stephen
Android obfuscation techniques include not only classic code obfuscation techniques that were adapted to Android, but also obfuscation methods that target the Android platform specifically. This work examines the status-quo of Android obfuscation, obfuscation detection and deobfuscation. Specifically, it first summarizes obfuscation approaches that are commonly used by app developers for code optimization, to protect their software against code theft and code tampering but are also frequently misused by malware developers to circumvent anti-malware products. Secondly, the article focuses on obfuscation detection techniques and presents various available tools and current research. Thirdly, deobfuscation (which aims at reinstating the original state before obfuscation) is discussed followed by a brief discussion how this impacts forensic investigation. We conclude that although obfuscation is widely used in Android app development (benign and malicious), available tools and the practices on how to deal with obfuscation are not standardized, and so are inherently lacking from a forensic standpoint.
Malware family classification via efficient Huffman features (2021)
O’Shaughnessy, Stephen ; Breitinger, Frank
As malware evolves and becomes more complex, researchers strive to develop detection and classification schemes that abstract away from the internal intricacies of binary code to represent malware without the need for architectural knowledge or invasive analysis procedures. Such approaches can reduce the complexities of feature generation and simplify the analysis process. In this paper, we present efficient Huffman features (eHf), a novel compression-based approach to feature construction, based on Huffman encoding, where malware features are represented in a compact format, without the need for intrusive reverse-engineering or dynamic analysis processes. We demonstrate the viability of eHf as a solution for classifying malware into their respective families on a large malware corpus of 15 k samples, indicative of the current threat landscape. We evaluate eHf against current compression-based alternatives and show that our method is comparable or superior for classification accuracy, while exhibiting considerably greater runtime efficiency. Finally we demonstrate that eHf is resilient against code reordering obfuscation.
Digital forensic tools: recent advances and enhancing the status quo (2020)
Wu, Tina ; Breitinger, Frank ; O'Shaughnessy, Stephen
  • 1 to 3

OPUS4 Logo

  • Contact
  • Imprint
  • Sitelinks