DEF CON Forum Site Header Art


No announcement yet.

(Beginner) Quark Engine - An Obfuscation-Neglect Android Malware Scoring System

  • Filter
  • Time
  • Show
Clear All
new posts

  • (Beginner) Quark Engine - An Obfuscation-Neglect Android Malware Scoring System

    Title: (Beginner) Quark Engine - An Obfuscation-Neglect Android Malware Scoring System

    Android malware analysis engine is not a new story. Every antivirus company has their own secrets to build it. With python and curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way.

    We have an order theory of criminal which explains stages of committing a crime. For example, crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced.

    According to the above principle, we developed our order theory of android malware. We develop five stages to see if the malicious activity is being practiced. They are:

    Permission requested.
    Native API call.
    Certain combination of native API.
    Calling sequence of native API.
    APIs that handle the same register.

    We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of a malware.

    Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation.

    Inspired by the design principles of the CPython interpreter, our Dalvik bytecode loader consists of functionalities such as 1. Finding cross-reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system.

    Further, we will also show a case study of Android malware and demonstrate how the obfuscation technique is useless to our engine. Last but not least, we will be open-sourcing everything (Malware Scoring System, Dalvik Bytecode Loader) during our presentation.


    Speaker(s): JunWei Song, KunYu Chen

    Location: Blue Team Vlg / Blue Team Vlg - Talks Track 1


    Event starts: 2020-08-07 10:00 (10:00 AM) PDT (UTC -07:00)

    Event ends: 2020-08-07 10:30 (10:30 AM) PDT (UTC -07:00)

    For the most up-to-date information, please either visit, or use HackerTracker, which is available for iOS and Android. This is an automated message, and this data was last modified 2020-08-06T21:47 (UTC).
    August 7, 2020 10:00
    August 7, 2020 10:30
    Blue Team Vlg / Blue Team Vlg - Talks Track 1
    Last edited by aNullValue; 7 hours ago.