The 8th International Conference on Next Generation Computing 2022 (2022.10)바로가기
페이지
pp.321-324
저자
Jae-do Lim, Il-kyu Kim, Namsu Kim, BooJoong Kang, Seong-je Cho
언어
영어(ENG)
URL
https://www.earticle.net/Article/A419813
원문정보
초록
영어
Android malware analysis systems examine the runtime behavior of apps in emulators for dynamic analysis. However, evasive Android malware can stop executing malicious activities to avoid detection by malware analysis systems if it finds itself executing on an emulator. Thus, it is important to investigate existing and potential techniques for detecting emulated environments. In this paper, we propose an effective technique to detect the latest Android emulators, Android Virtual Device (AVD), NoxPlayer, and BlueStacks. The proposed technique utilizes the properties of the build.prop file as well as android.os.Build class to detect the latest emulators. Experimental results show that emulators were effectively detected by checking the string values corresponding some specific properties.
목차
Abstract I. INTRODUCTION II. RELATED WORK III. EMULATOR DETECTION USING THE BUILD PROPERTIES A. Emulators and Experimental Environments B. Comparison of an AVD and NoxPlayer C. Comparison of an AVD and BlueStacks 5 IV. CONCOLUSION AND FUTURE WORK REFERENCES