Formal Methods for Android Banking Malware Analysis and Detection

被引:16
作者
Iadarola, Giacomo [1 ]
Martinelli, Fabio [1 ]
Mercaldo, Francesco [1 ,2 ]
Santone, Antonella [2 ]
机构
[1] CNR, Natl Res Council Italy, Inst Informat & Telemat, Pisa, Italy
[2] Univ Molise, Dept Biosci & Terr, Pesche, IS, Italy
来源
2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS) | 2019年
基金
欧盟地平线“2020”;
关键词
formal methods; model checking; malware detection; mobile malware; banking malware; Android; security;
D O I
10.1109/iotsms48152.2019.8939172
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Android operating system has been dominating the smart devices market in recent years. Smart home devices are populating our houses and smartphones are indispensable companions in daily life activities. In such a technological environment, the amount of data and user information shared across these devices is enormous and attractive for every malicious user. Consequently, developing good malware detection techniques is a crucial open problem to keep using these devices safely. This paper proposes the application of a formal methods based approach to detect banking malware in the Android environment. The experimental results are really promising, as demonstrated by the evaluation on real-world Android applications, where we reached precision and recall equal to 1.
引用
收藏
页码:331 / 336
页数:6
相关论文
共 32 条
[1]   DroidNative: Automating and optimizing detection of Android native code malware variants [J].
Alam, Shahid ;
Qu, Zhengyang ;
Riley, Ryan ;
Chen, Yan ;
Rastogi, Vaibhav .
COMPUTERS & SECURITY, 2017, 65 :230-246
[2]  
[Anonymous], 2016, IEEE T INF FORENSICS
[3]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[4]  
Babic Domagoj, 2011, Computer Aided Verification. Proceedings 23rd International Conference, CAV 2011, P116, DOI 10.1007/978-3-642-22110-1_10
[5]  
Bai C., 2019, IEEE T DEPEND SECURE
[6]  
Battista Pasquale, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P542
[7]   A Survey on Various Threats and Current State of Security in Android Platform [J].
Bhat, Parnika ;
Dutta, Kamlesh .
ACM COMPUTING SURVEYS, 2019, 52 (01)
[8]  
Brierley GJ, 2016, SPRING GEOGR, P59, DOI 10.1007/978-3-319-30475-5_3
[9]  
Canfora G., 2018, IEEE T SOFTWARE ENG
[10]   Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS [J].
Chen, Kai ;
Wang, Xueqiang ;
Chen, Yi ;
Wang, Peng ;
Lee, Yeonjoon ;
Wang, XiaoFeng ;
Ma, Bin ;
Wang, Aohui ;
Zhang, Yingjun ;
Zou, Wei .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :357-376