Automated analysis of freeware installers promoted by download portals
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.author | Geniola, Alberto | en_US |
dc.contributor.author | Antikainen, Markku | en_US |
dc.contributor.author | Aura, Tuomas | en_US |
dc.contributor.department | Department of Computer Science | en |
dc.contributor.groupauthor | Professorship Aura Tuomas | en |
dc.contributor.groupauthor | Helsinki Institute for Information Technology (HIIT) | en |
dc.date.accessioned | 2018-12-10T10:26:23Z | |
dc.date.available | 2018-12-10T10:26:23Z | |
dc.date.issued | 2018-08-01 | en_US |
dc.description.abstract | We present an analysis system for studying Windows application installers. The analysis system is fully automated from installer download to execution and data collection. The system emulates the behavior of a lazy user who wants to finish the installation dialogs with the default options and with as few clicks as possible. The UI automation makes use of image recognition techniques and heuristics. During the installation, the system collects data about the system modification and network access. The analysis system is scalable and can run on bare-metal hosts as well as in a data center. We use the system to analyze 792 freeware application installers obtained from popular download portals. In particular, we measure how many of them drop potentially unwanted programs (PUP) such as browser plugins or make other unwanted system modifications. We discover that most installers that download executable files over the network are vulnerable to man-in-the-middle attacks. We also find, that while popular download portals are not used for blatant malware distribution, nearly 10% of the analyzed installers come with a third-party browser or a browser extension. | en |
dc.description.version | Peer reviewed | en |
dc.format.extent | 17 | |
dc.format.extent | 209-225 | |
dc.format.mimetype | application/pdf | en_US |
dc.identifier.citation | Geniola, A, Antikainen, M & Aura, T 2018, ' Automated analysis of freeware installers promoted by download portals ', Computers and Security, vol. 77, pp. 209-225 . https://doi.org/10.1016/j.cose.2018.03.010 | en |
dc.identifier.doi | 10.1016/j.cose.2018.03.010 | en_US |
dc.identifier.issn | 0167-4048 | |
dc.identifier.other | PURE UUID: ac270550-676f-402b-9785-5b82e1fc68db | en_US |
dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/ac270550-676f-402b-9785-5b82e1fc68db | en_US |
dc.identifier.other | PURE LINK: http://www.scopus.com/inward/record.url?scp=85046425695&partnerID=8YFLogxK | en_US |
dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/29744483/1_s2.0_S0167404818302797_main.pdf | en_US |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/35202 | |
dc.identifier.urn | URN:NBN:fi:aalto-201812106217 | |
dc.language.iso | en | en |
dc.relation.ispartofseries | Computers and Security | en |
dc.relation.ispartofseries | Volume 77 | en |
dc.rights | openAccess | en |
dc.subject.keyword | Man-in-the-middle Malware | en_US |
dc.subject.keyword | Pay-per-install | en_US |
dc.subject.keyword | Potentially-unwanted program | en_US |
dc.subject.keyword | UI-automation | en_US |
dc.title | Automated analysis of freeware installers promoted by download portals | en |
dc.type | A2 Katsausartikkeli tieteellisessä aikakauslehdessä | fi |
dc.type.version | publishedVersion |