in 2015, while AES was the most popular cipher
in benign samples already in 2012.
3.
Very limited use of third-party cryptographic li-
braries. Our analysis showed that Android appli-
cation authors favor using system-based libraries
to deliver cryptographic functionality.
4.
Contrast between malicious and benign usage of
cryptography. Our study shows that cryptographic
API is generally more frequent in malware than in
benign samples (in relative measures).
Building a cryptography-based machine learning
model, we showed a significant difference in cryptogra-
phy deployment between benign and malware samples.
We demonstrated that a learning-based model based on
cryptography alone could separate between benign and
malicious samples with good performance. Moreover,
we showed that explaining the decision of the classifier
can expose intriguing links between cryptography and
malicious actions that are typically carried out by mal-
ware. In particular, these techniques constitute a valid
resource to guide the analysts towards discovering crit-
ical characteristics of the examined malicious samples.
Moreover, cryptographic features until now neglected
can be employed to further improve state-of-the-art
malware detectors.
Our results open door to various follow-up work.
For instance, it would be interesting to cluster malware
samples into families based on its usage of cryptog-
raphy. Likewise, future work can more closely focus
on understanding for what purpose specific crypto-
routines are employed in Android malware, thus better
understanding and profiling the characteristics of mal-
ware authors. This could, for instance, confirm or
dismiss our conjecture that weak hash functions are
not used for integrity-critical operations in malware.
Last but not least, one could employ more powerful
dynamic analysis to check if our findings hold also for
packed and obfuscated applications.
ACKNOWLEDGEMENTS
This work was partially supported by the project PON
AIM Research and Innovation 2014–2020 - Attraction
and International Mobility, funded by the Italian Min-
istry of Education, University and Research; and by
the European cybersecurity pilot CyberSec4Europe.
Vashek Matyas was supported by Czech Science Foun-
dation project GA20-03426S. Adam Janovsky was
supported by Invasys company. We are grateful to
Jonas Konecny who ran the initial machine learning
experiments. We also thank Avast for providing the
dynamic-analysis tool apklab.io.
REFERENCES
Allix, K., Bissyand
´
e, T. F., Klein, J., and Le Traon, Y. (2016).
AndroZoo: Collecting millions of Android apps for the
research community. In Proc. of MSR ’16, pages 468–
471. ACM.
Ami, A. S., Cooper, N., Kafle, K., Moran, K., Poshyvanyk,
D., and Nadkarni, A. (2021). Why Crypto-detectors
Fail: A Systematic Evaluation of Cryptographic Mis-
use Detection Techniques. arXiv:2107.07065 [cs].
Backes, M., Bugiel, S., and Derr, E. (2016). Reliable third-
party library detection in android and its security appli-
cations. In Proc. of CCS ’16, pages 356–367. ACM.
Biham, E. and Shamir, A. (1991). Differential cryptanalysis
of DES-like cryptosystems. Journal of CRYPTOLOGY,
4(1):3–72.
BusinessOfApps (2022). Android statistics. http://
businessofapps.com/data/android-statistics.
Chatzikonstantinou, A., Ntantogian, C., Karopoulos, G.,
and Xenakis, C. (2016). Evaluation of Cryptography
Usage in Android Applications. In Proc. of EAI BCT
’16, pages 83–90. ACM.
Chen, S., Xue, M., Tang, Z., Xu, L., and Zhu, H. (2016).
Stormdroid: A streaminglized machine learning-based
system for detecting android malware. In Proceedings
of the 11th ACM on Asia Conference on Computer
and Communications Security, ASIA CCS ’16, pages
377–388, New York, NY, USA. ACM.
Daniel, A., Michael, S., Malte, H., Hugo, G., and Rieck, K.
(2014). Drebin: Efficient and explainable detection of
android malware in your pocket. In Proceedings 2014
Network and Distributed System Security Symposium,
pages 23–26, San Diego, CA. The Internet Society.
Egele, M., Brumley, D., Fratantonio, Y., and Kruegel, C.
(2013). An empirical study of cryptographic misuse in
android applications. In Proc. of CCS’13, pages 73–84.
ACM.
Fahl, S., Harbach, M., Muders, T., Smith, M., Baumg
¨
artner,
L., and Freisleben, B. (2012). Why eve and mallory
love android: An analysis of android SSL (in)security.
In Proc. of CCS ’12, pages 50–61. ACM.
Gao, J., Kong, P., Li, L., Bissyande, T. F., and Klein, J.
(2019). Negative Results on Mining Crypto-API Usage
Rules in Android Apps. In Proc. of MSR ’19, pages
388–398. IEEE.
Isode Limited and OpenLDAP Foundation (2006). RFC
4422 - simple authentication and security layer (sasl).
http://tools.ietf.org/html/rfc4422. March 2, 2022.
Kr
¨
uger, S., Sp
¨
ath, J., Ali, K., Bodden, E., and Mezini, M.
(2018). CrySL: An Extensible Approach to Validating
the Correct Usage of Cryptographic APIs. In Proc. of
ECOOP ’18, LIPIcs vol. 109, pages 10:1–10:27. LZI.
Kursa, M. B., Rudnicki, W. R., et al. (2010). Feature selec-
tion with the boruta package. J Stat Softw, 36(11):1–13.
Lundberg, S. M. and Lee, S.-I. (2017). A unified approach
to interpreting model predictions. In Proc. of NIPS ’17,
pages 4765–4774. Curran Associates, Inc.
Ma, S., Lo, D., Li, T., and Deng, R. H. (2016a). CDRep:
Automatic Repair of Cryptographic Misuses in An-
SECRYPT 2022 - 19th International Conference on Security and Cryptography
132