AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors

Authors

Federico Maggi, Andrea Valdi, Stefano Zanero

Venue

Proceedings of the 3rd ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (SPSM), November 2011

Abstract

Although there are controversial opinions regarding how large the mobile malware phenomenon is in terms of absolute numbers, hype aside, the amount of new Android malware variants is increasing. This trend is mainly due to the fact that, as it happened with traditional malware, the authors are striving to repackage, obfuscate, or otherwise transform the executable code of their malicious apps in order to evade mobile security apps. There are about 85 of these apps only on the official marketplace. However, it is not clear how effective they are. Indeed, the sandboxing mechanism of Android does not allow (security) apps to audit other apps. We present AndroTotal, a publicly available tool, malware repository and research framework that aims at mitigating the above challenges, and allow researchers to automatically scan Android apps against an arbitrary set of malware detectors. We implemented AndroTotal and released it to the research community in April 2013. So far, we collected 18,758 distinct submitted samples and received the attention of several research groups (1,000 distinct accounts), who integrated their malware-analysis services with ours.

BibTeX

@inproceedings{Maggi2011AndroTotal_A,
  title     = {{AndroTotal: A Flexible, Scalable Toolbox and Service for Testing Mobile Malware Detectors}},
  author    = {Maggi, Federico and Valdi, Andrea and Zanero, Stefano},
  booktitle = {Proceedings of the 3rd ACM Workshop on Security and Privacy in Smartphones \& Mobile Devices},
  series    = {SPSM},
  year      = {2013},
  address   = {New York, NY, USA},
  doi       = {10.1145/2516760.2516768},
  isbn      = {978-1-4503-2491-5},
  pages     = {49--54},
  publisher = {ACM},
  url       = {http://dx.doi.org/10.1145/2516760.2516768}
}