Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching

dc.contributor.author Chen, Wenhao
dc.contributor.author Lin, Li
dc.contributor.author Newman, Jennifer
dc.contributor.author Guan, Yong
dc.contributor.department Center for Statistics and Applications in Forensic Evidence
dc.date.accessioned 2022-07-26T13:08:53Z
dc.date.available 2022-07-26T13:08:53Z
dc.date.issued 2021
dc.description.abstract The recent focus of cyber security on automated detection of malware for Android apps has omitted the study of some apps used for "legitimate" purposes, such as steganography apps. Mobile steganography apps can be used for delivering harmful messages, and while current research on steganalysis targets the detection of stego images using academic algorithms and well-built benchmarking image data sets, the community has overlooked uncovering a mobile app itself for its ability to perform steganographic embedding. Developing automatic tools for identifying the code in a suspect app as a stego app can be very challenging: steganography algorithms can be represented in a variety of ways, and there exists many image editing algorithms which appear similar to steganography algorithms. This paper proposes the first automated approach to detect Android steganography apps. We use symbolic execution to summarize an app’s image operation behavior into expression trees, and match the extracted expression trees with reference trees that represents the expected behavior of a steganography embedding process. We use a structural feature based similarity measure to calculate the similarity between expression trees. Our experiments show that, the propose approach can detect real world Android stego apps that implement common spatial domain and frequency domain embedding algorithms with a high degree of accuracy. Furthermore, our procedure describes a general framework that has the potential to be applied to other similar questions when studying program behaviors.
dc.description.comments This is a manuscript of a proceeding published as W. Chen, L. Lin, J. Newman and Y. Guan, "Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching," 2021 IEEE Conference on Communications and Network Security (CNS), 2021, pp. 254-262, doi: 10.1109/CNS53000.2021.9705047. Posted with permission of CSAFE.
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/7wbO2MMv
dc.language.iso en
dc.publisher © 2021 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.source.uri https://doi.org/10.1109/CNS53000.2021.9705047 *
dc.title Automatic Detection of Android Steganography Apps via Symbolic Execution and Tree Matching
dc.type Presentation
dspace.entity.type Publication
relation.isOrgUnitOfPublication d8a3c72b-850f-40f6-87c4-8812547080c7
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
2021-Chen-AutomaticDetectionManuscript.pdf
Size:
1.32 MB
Format:
Adobe Portable Document Format
Description:
Collections