Research

Paper

AI LLM February 20, 2026

AndroWasm: an Empirical Study on Android Malware Obfuscation through WebAssembly

Authors

Diego Soi, Silvia Lucia Sanna, Lorenzo Pisu, Leonardo Regano, Giorgio Giacinto

Abstract

In recent years, stealthy Android malware has increasingly adopted sophisticated techniques to bypass automatic detection mechanisms and harden manual analysis. Adversaries typically rely on obfuscation, anti-repacking, steganography, poisoning, and evasion techniques to AI-based tools, and in-memory execution to conceal malicious functionality. In this paper, we investigate WebAssembly (Wasm) as a novel technique for hiding malicious payloads and evading traditional static analysis and signature-matching mechanisms. While Wasm is typically employed to render specific gaming activities and interact with the native components in web browsers, we provide an in-depth analysis on the mechanisms Android may employ to include Wasm modules in its execution pipeline. Additionally, we provide Proofs-of-Concept to demonstrate a threat model in which an attacker embeds and executes malicious routines, effectively bypassing IoC detection by industrial state-of-the-art tools, like VirusTotal and MobSF.

Metadata

arXiv ID: 2602.18082
Provider: ARXIV
Primary Category: cs.CR
Published: 2026-02-20
Fetched: 2026-02-23 05:33

Related papers

Raw Data (Debug)
{
  "raw_xml": "<entry>\n    <id>http://arxiv.org/abs/2602.18082v1</id>\n    <title>AndroWasm: an Empirical Study on Android Malware Obfuscation through WebAssembly</title>\n    <updated>2026-02-20T09:15:51Z</updated>\n    <link href='https://arxiv.org/abs/2602.18082v1' rel='alternate' type='text/html'/>\n    <link href='https://arxiv.org/pdf/2602.18082v1' rel='related' title='pdf' type='application/pdf'/>\n    <summary>In recent years, stealthy Android malware has increasingly adopted sophisticated techniques to bypass automatic detection mechanisms and harden manual analysis. Adversaries typically rely on obfuscation, anti-repacking, steganography, poisoning, and evasion techniques to AI-based tools, and in-memory execution to conceal malicious functionality.\n  In this paper, we investigate WebAssembly (Wasm) as a novel technique for hiding malicious payloads and evading traditional static analysis and signature-matching mechanisms. While Wasm is typically employed to render specific gaming activities and interact with the native components in web browsers, we provide an in-depth analysis on the mechanisms Android may employ to include Wasm modules in its execution pipeline. Additionally, we provide Proofs-of-Concept to demonstrate a threat model in which an attacker embeds and executes malicious routines, effectively bypassing IoC detection by industrial state-of-the-art tools, like VirusTotal and MobSF.</summary>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.CR'/>\n    <published>2026-02-20T09:15:51Z</published>\n    <arxiv:primary_category term='cs.CR'/>\n    <author>\n      <name>Diego Soi</name>\n    </author>\n    <author>\n      <name>Silvia Lucia Sanna</name>\n    </author>\n    <author>\n      <name>Lorenzo Pisu</name>\n    </author>\n    <author>\n      <name>Leonardo Regano</name>\n    </author>\n    <author>\n      <name>Giorgio Giacinto</name>\n    </author>\n  </entry>"
}