A Model Checking based Proposal for Mobile Colluding Attack Detection

作者: Rosangela Casolare , Fabio Martinelli , Francesco Mercaldo , Antonella Santone

DOI: 10.1109/BIGDATA47090.2019.9006094

关键词: CollusionComputer securityComputer scienceAction (philosophy)Model checking

摘要: The application collusion attack is a new form of threat that becoming widespread in mobile environment. This technique requires two or more apps cooperate some way with the aim to perform malicious action they are unable independently. In this paper we propose adoption model checking detect whether performing attack.

参考文章(18)
Gerardo Canfora, Francesco Mercaldo, Giovanni Moriano, Corrado Aaron Visaggio, Composition-Malware: Building Android Malware at Run Time availability, reliability and security. pp. 318- 326 ,(2015) , 10.1109/ARES.2015.64
I Gordon Michael, Kim Deokhwan, H Perkins Jeff, Gilham Limei, Nguyen Nguyen, C Rinard Martin, None, Information-Flow Analysis of Android Applications in DroidSafe network and distributed system security symposium. ,(2015) , 10.14722/NDSS.2015.23089
Fengguo Wei, Sankardas Roy, Xinming Ou, Robby, Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps computer and communications security. pp. 1329- 1341 ,(2014) , 10.1145/2660267.2660357
Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, Srdjan Capkun, Analysis of the communication between colluding applications on modern smartphones Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12. pp. 51- 60 ,(2012) , 10.1145/2420950.2420958
Antonella Santone, Gigliola Vaglini, Abstract reduction in directed model checking CCS processes Acta Informatica. ,vol. 49, pp. 313- 341 ,(2012) , 10.1007/S00236-012-0161-3
Damien Octeau, Siegfried Rasthofer, Yves Le Traon, Tegawende F. Bissyande, Eric Bodden, Alexandre Bartel, Patrick McDaniel, Steven Arzt, Jacques Klein, Li Li, IccTA: detecting inter-component privacy leaks in Android apps international conference on software engineering. ,vol. 1, pp. 280- 291 ,(2015) , 10.5555/2818754.2818791
Colin Stirling, An introduction to modal and temporal logics for CCS Proceedings of the UK/Japan workshop on Concurrency : theory, language, and architecture: theory, language, and architecture. pp. 2- 20 ,(1991) , 10.1007/3-540-53932-8_41
Atif M. Memon, Ali Anwar, Colluding Apps: Tomorrow's Mobile Malware Threat ieee symposium on security and privacy. ,vol. 13, pp. 77- 81 ,(2015) , 10.1109/MSP.2015.143
Ke Xu, Yingjiu Li, Robert H Deng, None, ICCDetector: ICC-Based Malware Detection on Android IEEE Transactions on Information Forensics and Security. ,vol. 11, pp. 1252- 1264 ,(2016) , 10.1109/TIFS.2016.2523912