Ransomware Steals Your Phone. Formal Methods Rescue It

被引:72
作者
Mercaldo, Francesco [1 ]
Nardone, Vittoria [1 ]
Santone, Antonella [1 ]
Visaggio, Corrado Aaron [1 ]
机构
[1] Univ Sannio, Dept Engn, Benevento, Italy
来源
FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS (FORTE 2016) | 2016年 / 9688卷
关键词
Malware; Android; Security; Formal methods; Temporal logic; VERIFICATION;
D O I
10.1007/978-3-319-39570-8_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ransomware is a recent type of malware which makes inaccessible the files or the device of the victim. The only way to unlock the infected device or to have the keys for decrypting the files is to pay a ransom to the attacker. Commercial solutions for removing ransomware and restoring the infected devices and files are ineffective, since this malware uses a very robust form of asymmetric cryptography and erases shadow copies and recovery points of the operating system. Literature does not count many solutions for effectively detecting and blocking ransomware and, at the best knowledge of the authors, formal methods were never applied to identify ransomware. In this paper we propose a methodology based on formal methods that is able to detect the ransomware and to identify in the malware's code the instructions that implement the characteristic instructions of the ransomware. The results of the experimentation are strongly encouraging and suggest that the proposed methodology could be the right way to follow for developing commercial solutions that could successful intercept the ransomware and blocking the infections it provokes.
引用
收藏
页码:212 / 221
页数:10
相关论文
共 21 条
[1]   Efficient verification of a multicast protocol for mobile computing [J].
Anastasi, G ;
Bartoli, A ;
De Francesco, N ;
Santone, A .
COMPUTER JOURNAL, 2001, 44 (01) :21-30
[2]  
Andronio Nicolo, 2015, Research in Attacks, Intrusions and Defenses. 18th International Symposium, RAID 2015. Proceedings: LNCS 9404, P382, DOI 10.1007/978-3-319-26362-5_18
[3]  
[Anonymous], 1989, PRENTICE HALL INT SE
[4]  
[Anonymous], 2014, P 21 ANN NETW DISTR
[5]  
Barbuti R, 1999, SOFTWARE PRACT EXPER, V29, P1123, DOI 10.1002/(SICI)1097-024X(199910)29:12<1123::AID-SPE275>3.0.CO
[6]  
2-6
[7]  
Batista E, 2016, INT CONF INFORM INTE
[8]  
Canfora G, 2015, P WORKSH MOB SYST TE
[9]   Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking [J].
Ceccarelli, Michele ;
Cerulo, Luigi ;
De Ruvo, Giuseppe ;
Nardone, Vittoria ;
Santone, Antonella .
2015 IEEE/ACM 3RD FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING, 2015, :26-32
[10]  
Cleaveland R., 1996, Computer Aided Verification. 8th International Conference, CAV '96. Proceedings, P394