Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mykola Protsenko is active.

Publication


Featured researches published by Mykola Protsenko.


availability, reliability and security | 2014

Divide-and-Conquer: Why Android Malware Cannot Be Stopped

Dominik Maier; Tilo Müller; Mykola Protsenko

In this paper, we demonstrate that Android malware can bypass all automated analysis systems, including AV solutions, mobile sandboxes, and the Google Bouncer. We propose a tool called Sand-Finger for the fingerprinting of Android-based analysis systems. By analyzing the fingerprints of ten unique analysis environments from different vendors, we were able to find characteristics in which all tested environments differ from actual hardware. Depending on the availability of an analysis system, malware can either behave benignly or load malicious code at runtime. We classify this group of malware as Divide-and-Conquer attacks that are efficiently obfuscated by a combination of fingerprinting and dynamic code loading. In this group, we aggregate attacks that work against dynamic as well as static analysis. To demonstrate our approach, we create proof-of-concept malware that surpasses up-to-date malware scanners for Android. We also prove that known malware samples can enter the Google Play Store by modifying them only slightly. Due to Androids lack of an API for malware scanning at runtime, it is impossible for AV solutions to secure Android devices against these attacks.


international conference on malicious and unwanted software | 2013

PANDORA applies non-deterministic obfuscation randomly to Android

Mykola Protsenko; Tilo Müller

Android, a Linux-based operating system, is currently the most popular platform for mobile devices like smart-phones and tablets. Recently, two closely related security threats have become a major concern of the research community: software piracy and malware. This paper studies the capabilities of code obfuscation for the purposes of plagiarized software and malware diversification. Within the scope of this work, the PANDORA (PANDORA Applies Non-Deterministic Obfuscation Randomly to Android) transformation system for Android bytecode was designed and implemented, combining techniques for data and object-oriented design obfuscation. Our evaluation results indicate deficiencies of the malware detection engines currently used in 46 popular antivirus products, which in most cases were not able to detect samples obfuscated with PANDORA. Furthermore, this paper reveals shortcomings of the Androsim tool and potentially other static software similarity algorithms, recently proposed to address the piracy problem in Android.


Computers & Security | 2015

A game of Droid and Mouse

Dominik Maier; Mykola Protsenko; Tilo Müller

In the work at hand, we first demonstrate that Android malware can bypass current automated analysis systems, including AV solutions, mobile sandboxes, and the Google Bouncer. A tool called Sand-Finger allowed us to fingerprint Android-based analysis systems. By analyzing the fingerprints of ten unique analysis environments from different vendors, we were able to find characteristics in which all tested environments differ from actual hardware. Depending on the availability of an analysis system, malware can either behave benignly or load malicious code dynamically at runtime. We also have investigated the widespread of dynamic code loading among benign and malicious apps, and found that malicious apps make use of this technique more often. About one third out of 14,885 malware samples we analyzed was found to dynamically load and execute code. To hide malicious code from analysis, it can be loaded from encrypted assets or via network connections. As we show, however, even dynamic scripts which call existing functions enable an attacker to execute arbitrary code. To demonstrate the effectiveness of both dynamic code and script loading, we create proof-of-concept malware that surpasses up-to-date malware scanners for Android and show that known samples can enter the Google Play Store by modifying them only slightly.


availability, reliability and security | 2015

Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code

Mykola Protsenko; Sebastien Kreuter; Tilo Müller

With over one billion sold devices, representing 80% market share, Android remains the most popular platform for mobile devices. Application piracy on this platform is a major concern and a cause of significant losses: about 97% of the top 100 paid apps were found to be hacked in terms of repackaging or the distribution of clones. Therefore new and stronger methods aiming to increase the burden on reverse engineering and modification of proprietary mobile software are required. In this paper, we propose an application of the Android native code component to implement strong software self-protection for apps. Within this scope, we present three dynamic obfuscation techniques, namely dynamic code loading, dynamic re-encryption, and tamper proofing. We provide a practical evaluation of this approach, assessing both the cost and efficiency of its achieved protection level. Our results indicate that with the proposed methods one can reach significant complication of the reverse-engineering process, while being affordable in terms of execution time and application size.


international conference on security and privacy in communication systems | 2014

An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKs

Felix C. Freiling; Mykola Protsenko; Yan Zhuang

We investigate the problem of creating complex software obfuscation for mobile applications. We construct complex software obfuscation from sequentially applying simple software obfuscation methods. We define several desirable and undesirable properties of such transformations, including idempotency and monotonicity. We empirically evaluate a set of 7 obfuscation methods on 240 Android Packages (APKs). We show that many obfuscation methods are idempotent or monotonous.


Proceedings of the Confederated International Conferences on On the Move to Meaningful Internet Systems: OTM 2015 Conferences - Volume 9415 | 2015

CloudIDEA: A Malware Defense Architecture for Cloud Data Centers

Andreas Fischer; Thomas Kittel; Bojan Kolosnjaji; Tamas K. Lengyel; Waseem Mandarawi; Hermann de Meer; Tilo Müller; Mykola Protsenko; Hans P. Reiser; Benjamin Taubmann; Eva Weishäupl

Due to the proliferation of cloud computing, cloud-based systems are becoming an increasingly attractive target for malware. In an Infrastructure-as-a-Service IaaS cloud, malware located in a customers virtual machine VM affects not only this customer, but may also attack the cloud infrastructure and other co-hosted customers directly. This paper presents CloudIDEA, an architecture that provides a security service for malware defens in cloud environments. It combines lightweight intrusion monitoring with on-demand isolation, evidence collection, and in-depth analysis of VMs on dedicated analysis hosts. A dynamic decision engine makes on-demand decisions on how to handle suspicious events considering cost-efficiency and quality-of-service constraints.


trust and privacy in digital business | 2014

Android Malware Detection Based on Software Complexity Metrics

Mykola Protsenko; Tilo Müller

In this paper, we propose a new approach for the static detection of Android malware by means of machine learning that is based on software complexity metrics, such as McCabe’s Cyclomatic Complexity and the Chidamber and Kemerer Metrics Suite. The practical evaluation of our approach, involving 20,703 benign and 11,444 malicious apps, witnesses a high classification quality of our proposed method, and we assess its resilience against common obfuscation transformations. With respect to our large-scale test set of more than 32,000 apps, we show a true positive rate of up to 93% and a false positive rate of 0.5% for unobfuscated malware samples. For obfuscated malware samples, however, we register a significant drop of the true positive rate, whereas permission-based classification schemes are immune against such program transformations. According to these results, we advocate for our new method to be a useful detector for samples within a malware family sharing functionality and source code. Our approach is more conservative than permission-based classifications, and might hence be more suitable for an automated weighting of Android apps, e.g., by the Google Bouncer.


vehicular technology conference | 2014

Toward an Open Source Location Privacy Evaluation Framework for Vehicular Networks

David Eckhoff; Mykola Protsenko; Reinhard German

Outline and present building blocks for a comprehensive open source location privacy evaluation framework to enable researchers to reproducibly assess the effectiveness of a given privacy protection algorithm. We also present a proof of concept evaluation. By extending the well established Veins simulation framework [4] that couples the traffic simulator SUMO and the network simulator OMNeT++ we allow for an easy setup and integration with existing simulation scenarios or already implemented protocols. We hope that our framework lowers the complexity of privacy evaluation and thereby makes certain protection measures more likely to be considered in future vehicular networks.


international semiconductor laser conference | 2014

An(other) Exercise in Measuring the Strength of Source Code Obfuscation

Yan Zhuang; Mykola Protsenko; Tilo Mueller; Felix C. Freiling

We experimentally compare the strength of different source code obfuscation techniques by measuring the performance of human analysts. We describe an experimental setup by which it is possible to compare different obfuscation techniques with each other. As techniques, we considered name overloading and opaque predicates, as well as the combination of both. While the results are interesting and show that increased levels of obfuscation decrease the performance of humans, only one result (the use of name overloading) was statistically significant.


trust and privacy in digital business | 2015

Protecting Android Apps Against Reverse Engineering by the Use of the Native Code

Mykola Protsenko; Tilo Müller

Having about 80 % of the market share, Android is currently the clearly dominating platform for mobile devices. Application theft and repackaging remains a major threat and a cause of significant losses, affecting as much as 97 % of popular paid apps. The ease of decompilation and reverse engineering of high-level bytecode, in contrast to native binary code, is considered one of the main reasons for the high piracy rate. In this paper, we address this problem by proposing four static obfuscation techniques: native opaque predicates, native control flow flattening, native function indirection, and native field access indirection. These techniques provide a simple and yet effective way of reducing the task of bytecode reverse engineering to the much harder task of reverse engineering native code. For this purpose, native function calls are injected into an app’s bytecode, introducing artificial dependencies between the two execution domains. The adversary is forced to analyze the native code in order to be able to comprehend the overall app’s functionality and to successfully launch static and dynamic analyses. Our evaluation results of the proposed protection methods witness an acceptable cost in terms of execution time and application size, while significantly complicating the reverse-engineering process.

Collaboration


Dive into the Mykola Protsenko's collaboration.

Top Co-Authors

Avatar

Tilo Müller

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar

Dominik Maier

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar

Felix C. Freiling

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar

Yan Zhuang

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Eckhoff

University of Erlangen-Nuremberg

View shared research outputs
Top Co-Authors

Avatar

Eva Weishäupl

University of Regensburg

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge