cessity to keep up with demand otherwise there would
need to be a choice between delaying publication of
apps or publishing apps where their behaviour has not
been examined.
One exception is if the app is being executed from
within Google Bouncer; if it is possible for Google
Play services to detect that an app is being executed
on Bouncer then the service can be configured to send
confidence values that allow the apps behaviour to be
explored.
6 CONCLUSION
In this paper we conducted a study of the sensors
available from automated Android analysis platforms.
We started by developing an Android app that was
customised to each target to allow us to correctly at-
tribute the data received from each sandbox. Our first
observation was that very few sandboxes out of the
original survey responded directly. This is either be-
cause the platform did not support the app or the traf-
fic from the app was not allowed to transit the sand-
box’s network. We found that only three of the ini-
tially surveyed sandboxes responded in the correctly
formatted manner. However the server still received
responses from seventy-seven hosts.
Analysis of the sensor implementations on pub-
licly available sandboxes showed that the accelerom-
eter was the most ubiquitous of the available sensors
and thus formed the basis of the remaining research.
We found that all analysis platforms that returned sen-
sor lists to our server included a clear indication that
they were virtual and thus are trivial to detect. Other
indicators were the presence of just the accelerometer
or no sensors in the list at all.
On the platforms that returned accelerometer val-
ues in their X, Y, Z dimensional components, all re-
sponses were static and we modelled the threat of de-
tection by rating these responses. The worst being
all 0s returned which, in the presence of gravity and
noise from the device itself, is impossible. The best
current solution is to use a physical device to obtain
real time dynamic values.
As a future work we will aim to implement a sys-
tem to increase transparency of publicly accessible
malware analysis platforms by replacing the locally
sourced sensor values with ones produced by a model
of human activities.
We will also aim to look at implementing our own
model of activity recognition as the basis of a Reverse
Turing Test and compare it to Google Play.
REFERENCES
Anguita, D., Ghio, A., Oneto, L., Parra, X., Reyes-Ortiz,
J. L., et al. (2013). A public domain dataset for human
activity recognition using smartphones. In Esann, vol-
ume 3, page 3.
Bashari Rad, B., Masrom, M., and Ibrahim, S. (2012). Cam-
ouflage in malware: From encryption to metamor-
phism. International Journal of Computer Science
And Network Security (IJCSNS), 12:74–83.
Botas,
´
A., Rodr
´
ıguez, R. J., Matell
´
an, V., and Garc
´
ıa, J. F.
(2018). Empirical study to fingerprint public mal-
ware analysis services. In P
´
erez Garc
´
ıa, H., Alfonso-
Cend
´
on, J., S
´
anchez Gonz
´
alez, L., Quinti
´
an, H.,
and Corchado, E., editors, International Joint Con-
ference SOCO’17-CISIS’17-ICEUTE’17 Le
´
on, Spain,
September 6–8, 2017, Proceeding, pages 589–599,
Cham. Springer International Publishing.
Ferrand, O. (2015). How to detect the cuckoo sandbox and
to strengthen it? Journal of Computer Virology and
Hacking Techniques, 11.
Moser, A., Kruegel, C., and Kirda, E. (2007). Limits of
static analysis for malware detection. In Twenty-Third
Annual Computer Security Applications Conference
(ACSAC 2007), pages 421–430. IEEE.
Nguyen, K. A., Akram, R. N., Markantonakis, K., Luo,
Z., and Watkins, C. (2019). Location Tracking Us-
ing Smartphone Accelerometer and Magnetometer
Traces. Proceedings of the 14th International Con-
ference on Availability, Reliability and Security, pages
1–9.
Shrestha, B., Ma, D., Zhu, Y., Li, H., and Saxena, N.
(2015). Tap-wave-rub: Lightweight human interac-
tion approach to curb emerging smartphone malware.
IEEE Transactions on Information Forensics and Se-
curity, 10(11):2270–2283.
Sun, K. (2019). Google Play Apps Drop Anubis, Use
Motion-based Evasion. Example of malware authors
using an accelerometer to detect Googles bouncer and
get their app onto the legitimate Google play store.
The apps were called BatterySaverMobi and Currency
Convertor.
Zhang, J., Beresford, A. R., and Sheret, I. (2019). SEN-
SORID: Sensor Calibration Fingerprinting for Smart-
phones. 2019 IEEE Symposium on Security and Pri-
vacy (SP), 00:638–655.
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
602