LEILA: Formal Tool for Identifying Mobile Malicious Behaviour

作者: Gerardo Canfora , Fabio Martinelli , Francesco Mercaldo , Vittoria Nardone , Antonella Santone

DOI: 10.1109/TSE.2018.2834344

关键词:

摘要: With the increasing diffusion of mobile technologies, nowadays devices represent an irreplaceable tool to perform several operations, from posting a status on social network transfer money between bank accounts. As consequence, store huge amount private and sensitive information this is reason why attackers are developing very sophisticated techniques extort data our devices. This paper presents design implementation LEILA (formaL for idEntifying mobIle maLicious behAviour), targeted at Android malware families detection. based novel approach that exploits model checking analyse verify Java Bytecode produced when source code compiled. After thorough description method used detection, we report experiments have conducted using LEILA. The demonstrated effective in detecting malicious behaviour and, especially, localizing payload within code: evaluated real-world belonging widespread obtaining accuracy ranging 0.97 1.

参考文章(46)
Fu Song, Tayssir Touili, Model-Checking for Android Malware Detection asian symposium on programming languages and systems. pp. 216- 235 ,(2014) , 10.1007/978-3-319-12736-1_12
Edmund M. Clarke, E. Allen Emerson, DESIGN AND SYNTHESIS OF SYNCHRONIZATION SKELETONS USING BRANCHING TIME TEMPORAL LOGIC 25 Years of Model Checking. ,vol. 131, pp. 196- 215 ,(2008) , 10.1007/978-3-540-69850-0_12
Robin Milner, Communication and Concurrency ,(1989)
Min Zheng, Patrick P. C. Lee, John C. S. Lui, ADAM: an automatic and extensible platform to stress test android anti-virus systems international conference on detection of intrusions and malware and vulnerability assessment. pp. 82- 101 ,(2012) , 10.1007/978-3-642-37300-8_5
Damien Octeau, Yves Le Traon, Eric Bodden, Alexandre Bartel, Patrick McDaniel, Jacques Klein, Somesh Jha, Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis usenix security symposium. pp. 543- 558 ,(2013)
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6
Jesper R. Andersen, Nicklas Andersen, Søren Enevoldsen, Mathias M. Hansen, Kim G. Larsen, Simon R. Olesen, Jirí Srba, Jacob K. Wortmann, CAAL: Concurrency Workbench, AalborgźEdition international colloquium on theoretical aspects of computing. pp. 573- 582 ,(2015) , 10.1007/978-3-319-25150-9_33
Fu Song, Tayssir Touili, PoMMaDe: pushdown model-checking for malware detection foundations of software engineering. pp. 607- 610 ,(2013) , 10.1145/2491411.2494599
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Ilsun You, Kangbin Yim, Malware Obfuscation Techniques: A Brief Survey broadband and wireless computing, communication and applications. pp. 297- 300 ,(2010) , 10.1109/BWCCA.2010.85