Dual-force: Understanding WebView Malware Via Cross-Language Forced Execution

Zhenhao Tang,Juan Zhai,Minxue Pan,Yousra Aafer,Shiqing Ma,Xiangyu Zhang,Jianhua Zhao
DOI: https://doi.org/10.1145/3238147.3238221
2018-01-01
Abstract:Modern Android malwares tend to use advanced techniques to cover their malicious behaviors. They usually feature multi-staged, condition-guarded and environment-specific payloads. An increasing number of them utilize WebView, particularly the two-way communications between Java and JavaScript, to evade detection and analysis of existing techniques. We propose Dual-Force, a forced execution technique which simultaneously forces both Java and JavaScript code of WebView applications to execute along various paths without requiring any environment setup or providing any inputs manually. As such, the hidden payloads of WebView malwares are forcefully exposed. The technique features a novel execution model that allows forced execution to suppress exceptions and continue execution. Experimental results show that Dual-Force precisely exposes malicious payload in 119 out of 150 WebView malwares. Compared to the state-of-the-art, Dual-Force can expose 23% more malicious behaviors.
What problem does this paper attempt to address?