Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation

被引:12
作者
Martinelli, Fabio [1 ]
Mercaldo, Francesco [1 ,3 ]
Nardone, Vittoria [2 ]
Santone, Antonella [3 ]
Vaglini, Gigliola [4 ]
机构
[1] Natl Res Council Italy CNR, Inst Informat & Telemat, Pisa, Italy
[2] Univ Sannio, Dept Engn, Benevento, Italy
[3] Univ Molise, Dept Med & Hlth Sci Vincenzo Tiberio, Campobasso, Italy
[4] Univ Pisa, Dept Informat Engn, Pisa, Italy
关键词
Model checking; Formal methods; Machine learning; Malware; Android; Security;
D O I
10.1016/j.simpat.2020.102169
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Android currently represents the most widespread operating system focused on mobile devices. It is not surprising that the majority of malware is created to perpetrate attacks targeting mobile devices equipped with this operating systems. In the mobile malware landscape, there exists a plethora of malware families exhibiting different malicious behaviors. One of the recent threat in this landscape is represented by the HummingBad malware, able to perpetrate multiple attacks for obtain root credentials and to silently install applications on the infected device. From these considerations, in this paper we discuss two different methodologies aimed to detect malicious samples targeting Android environment. In detail the first approach is based on machine learning technique, while the second one is a model checking based approach. Moreover, the model checking approach is able to localize the malicious behaviour of the application under analysis code, in terms of package, class and method. We evaluate the effectiveness of both the designed methods on real-world samples belonging to the HummingBad malware family, one of the most recent and aggressive behaviour embed into malicious Android applications.
引用
收藏
页数:11
相关论文
共 38 条
[1]   CAAL: Concurrency Workbench, Aalborg Edition [J].
Andersen, Jesper R. ;
Andersen, Nicklas ;
Enevoldsen, Soren ;
Hansen, Mathias M. ;
Larsen, Kim G. ;
Olesen, Simon R. ;
Srba, Jiri ;
Wortmann, Jacob K. .
THEORETICAL ASPECTS OF COMPUTING - ICTAC 2015, 2015, 9399 :573-582
[2]  
[Anonymous], 1989, PRENTICE HALL INT SE
[3]  
[Anonymous], 2012, P 33 IEEE S SEC PRIV
[4]  
[Anonymous], 2001, MODEL CHECKING
[5]  
Arp Daniel, 2014, P 21 ANN NETW DISTR
[6]  
Canfora G., 2015, E BUSINESS TELECOMMU, P201
[7]  
Canfora G., 2015, P 3 INT WORKSH SOFTW, P13
[8]   LEILA: Formal Tool for Identifying Mobile Malicious Behaviour [J].
Canfora, Gerardo ;
Martinelli, Fabio ;
Mercaldo, Francesco ;
Nardone, Vittoria ;
Santone, Antonella ;
Visaggio, Corrado Aaron .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (12) :1230-1252
[9]   An HMM and structural entropy based detector for Android malware: An empirical study [J].
Canfora, Gerardo ;
Mercaldo, Francesco ;
Visaggio, Corrado Aaron .
COMPUTERS & SECURITY, 2016, 61 :1-18
[10]  
Canfora G, 2015, 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, P27