Aktivitäten
-
Guess that makes me a successful business angel 😄 Congrats guys!
Guess that makes me a successful business angel 😄 Congrats guys!
Geteilt von Dominik Christian Maier
-
The US Secret Service dismantled what appears to be a highly coordinated deployment of cellular devices that were allegedly used to conduct…
The US Secret Service dismantled what appears to be a highly coordinated deployment of cellular devices that were allegedly used to conduct…
Beliebt bei Dominik Christian Maier
-
Who wants to help secure the most-used OS in the world? Join us to help guard the Android platform against fraud and abuse. https://lnkd.in/gyMskAgw…
Who wants to help secure the most-used OS in the world? Join us to help guard the Android platform against fraud and abuse. https://lnkd.in/gyMskAgw…
Beliebt bei Dominik Christian Maier
Berufserfahrung
Ausbildung
-
Technische Universität Berlin
-
–
Thesis topic: Automated Security Testing of Unexplored Targets Through Feedback-Guided Fuzzing
-
-
–
Activities and Societies: FAU Security Team (FAUST)
Computer Science with focus on programming and security. Additionally hearing spanish and philosophy
-
-
–
Research on Secure Smartphone Authentication at NECSTLab
-
-
–
Activities and Societies: FAU Security Team, FSI Wirtschaftsinformatik
Business informatics focused on security research and innovation
Bescheinigungen und Zertifikate
Veröffentlichungen
-
A Game of Droid and Mouse: The Threat of Split-Personality Malware on Android.
Computers & Security (COSE)
In the work at hand, we first demonstrate that Android malware can bypass current automated analysis systems, including AV solutions, mobile sandboxes, and the Google Bouncer. A tool called Sand-Finger allowed us to fingerprint Android-based analysis systems. By analyzing the fingerprints of ten unique analysis environments from different vendors, we were able to find characteristics in which all tested environments differ from actual hardware. Depending on the availability of an analysis…
In the work at hand, we first demonstrate that Android malware can bypass current automated analysis systems, including AV solutions, mobile sandboxes, and the Google Bouncer. A tool called Sand-Finger allowed us to fingerprint Android-based analysis systems. By analyzing the fingerprints of ten unique analysis environments from different vendors, we were able to find characteristics in which all tested environments differ from actual hardware. Depending on the availability of an analysis system, malware can either behave benignly or load malicious code dynamically at runtime. We also have investigated the widespread of dynamic code loading among benign and malicious apps, and found that malicious apps make use of this technique more often. About one third out of 14,885 malware samples we analyzed was found to dynamically load and execute code. To hide malicious code from analysis, it can be loaded from encrypted assets or via network connections. As we show, however, even dynamic scripts which call existing functions enable an attacker to execute arbitrary code. To demonstrate the effectiveness of both dynamic code and script loading, we create proof-of-concept malware that surpasses up-to-date malware scanners for Android and show that known samples can enter the Google Play Store by modifying them only slightly.
Andere Autor:innen -
-
Divide-and-Conquer: Why Android Malware cannot be stopped
Availability, Reliability and Security (ARES)
In this paper, we demonstrate that Android malware
can bypass all automated analysis systems, including
AV solutions, mobile sandboxes, and the Google Bouncer.
We propose a tool called Sand-Finger for the fingerprinting
of Android-based analysis systems. By analyzing the fingerprints
of ten unique analysis environments from different
vendors, we were able to find characteristics in which all
tested environments differ from actual hardware. Depending
on the availability…In this paper, we demonstrate that Android malware
can bypass all automated analysis systems, including
AV solutions, mobile sandboxes, and the Google Bouncer.
We propose a tool called Sand-Finger for the fingerprinting
of Android-based analysis systems. By analyzing the fingerprints
of ten unique analysis environments from different
vendors, we were able to find characteristics in which all
tested environments differ from actual hardware. Depending
on the availability of an analysis system, malware can either
behave benignly or load malicious code at runtime.
We classify this group of malware as Divide-and-Conquer
attacks that are efficiently obfuscated by a combination of
fingerprinting and dynamic code loading. In this group, we
aggregate attacks that work against dynamic as well as static
analysis. To demonstrate our approach, we create proof-ofconcept
malware that surpasses up-to-date malware scanners
for Android. We also prove that known malware samples can
enter the Google Play Store by modifying them only slightly.
Due to Android’s lack of an API for malware scanning at
runtime, it is impossible for AV solutions to secure Android
devices against these attacks.Andere Autor:innen -
Auszeichnungen/Preise
-
CAST-Förderpreis IT-Sicherheit 2015 (Best Bachelor's Thesis in Information Security)
CAST eV
Award for best Bachelor's thesis in the field of IT-Security for my thesis "Obfuscation Techniques for Android Malware to Bypass Sandboxes"
Sprachen
-
Englisch
Verhandlungssicher
-
Französisch
Grundkenntnisse
-
Spanisch
Grundkenntnisse
-
Deutsch
Muttersprache oder zweisprachig
-
Italienisch
Grundkenntnisse
Weitere Aktivitäten von Dominik Christian Maier
-
Bumping this, come join a team with a great manager and peers. If you've got a background in security, android, or running services at scale, we…
Bumping this, come join a team with a great manager and peers. If you've got a background in security, android, or running services at scale, we…
Beliebt bei Dominik Christian Maier
-
✨ We're back from the DEF CON CTF in #Vegas🚩 ❣️ We managed a fantastic 6th place ❣️ Thanks all for the great experience even this…
✨ We're back from the DEF CON CTF in #Vegas🚩 ❣️ We managed a fantastic 6th place ❣️ Thanks all for the great experience even this…
Beliebt bei Dominik Christian Maier
-
Attending DEF CON? Learn fault-injection in our hextree.io Glitching Lab! You can find us in the Embedded Systems Village!
Attending DEF CON? Learn fault-injection in our hextree.io Glitching Lab! You can find us in the Embedded Systems Village!
Beliebt bei Dominik Christian Maier
-
Two things: Last week marked my final week as an intern at Brave 🦁 Time flies… I’ll definitely miss the brilliant minds and the exciting work we did…
Two things: Last week marked my final week as an intern at Brave 🦁 Time flies… I’ll definitely miss the brilliant minds and the exciting work we did…
Beliebt bei Dominik Christian Maier
-
We are back at #DEFCON with the Glitching Lab. Bring your own laptop, headphones and internet to learn fault injection with our self-paced workshop.…
We are back at #DEFCON with the Glitching Lab. Bring your own laptop, headphones and internet to learn fault injection with our self-paced workshop.…
Beliebt bei Dominik Christian Maier