Localization and Inhibition of Malicious Behaviors through a Model Checking based methodology

作者: Mario G.C.A. Cimino , Vaglini Gigliola

DOI: 10.5220/0006287906730652

关键词: Model checkingFormal methodsMalwareAndroid (operating system)Computer scienceComputer security

摘要:

参考文章(20)
Fu Song, Tayssir Touili, Model-Checking for Android Malware Detection asian symposium on programming languages and systems. pp. 216- 235 ,(2014) , 10.1007/978-3-319-12736-1_12
Fu Song, Tayssir Touili, Efficient Malware Detection Using Model-Checking formal methods. pp. 418- 433 ,(2012) , 10.1007/978-3-642-32759-9_34
Hubert Garavel, Radu Mateescu, Frédéric Lang, Wendelin Serwe, CADP 2006: A Toolbox for the Construction and Analysis of Distributed Processes Computer Aided Verification. ,vol. 4590, pp. 158- 163 ,(2007) , 10.1007/978-3-540-73368-3_18
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Kruegel, Engin Kirda, Scalable, behavior-based malware clustering network and distributed system security symposium. ,(2009)
Luca Tesei, Antonella Santone, Nicoletta De Francesco, Roberto Barbuti, A Notion of Non-Interference for Timed Automata Fundamenta Informaticae. ,vol. 51, pp. 1- 11 ,(2002)
Fu Song, Tayssir Touili, PoMMaDe: pushdown model-checking for malware detection foundations of software engineering. pp. 607- 610 ,(2013) , 10.1145/2491411.2494599
A. Pnueli, R. Rosner, On the synthesis of a reactive module symposium on principles of programming languages. pp. 179- 190 ,(1989) , 10.1145/75277.75293
Jiyong Jang, David Brumley, Shobha Venkataraman, BitShred Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 309- 320 ,(2011) , 10.1145/2046707.2046742
Roberto Barbuti, Nicoletta De Francesco, Antonella Santone, Gigliola Vaglini, Selective Mu-Calculus and Formula-Based Equivalence of Transition Systems Journal of Computer and System Sciences. ,vol. 59, pp. 537- 556 ,(1999) , 10.1006/JCSS.1999.1660
Xin Hu, Tzi-cker Chiueh, Kang G. Shin, Large-scale malware indexing using function-call graphs computer and communications security. pp. 611- 620 ,(2009) , 10.1145/1653662.1653736