DroidFDR: Automatic Classification of Android Malware Using Model Checking

被引:2
作者
Yang, Zhi [1 ,2 ]
Chao, Fan [1 ,2 ]
Chen, Xingyuan [1 ,2 ,3 ]
Jin, Shuyuan [4 ]
Sun, Lei [1 ,2 ]
Du, Xuehui [1 ,2 ]
机构
[1] PLA Informat Engn Univ, Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
[2] Informat Engn Univ, Henan Prov Key Lab Informat Secur, Zhengzhou 450001, Peoples R China
[3] State Key Lab Cryptol, Beijing 100084, Peoples R China
[4] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Android; malware detection; communicating sequential processes; formal method; model checking;
D O I
10.3390/electronics11111798
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android faces an increasing threat of malware attacks. The few existing formal detection methods have drawbacks such as complex code modeling, incomplete and inaccurate expression of family properties, and excessive manual participation. To this end, this paper proposes a formal detection method, called DroidFDR, for Android malware classification based on communicating sequential processes (CSP). In this method, the APK file of an application is converted to an easy-to-analyze representation, namely Jimple, in order to model the code behavior with CSP. The process describing the behavior of a sample is inputted to an FDR model checker to be simplified and verified against a process that is automatically abstracted from the malware to express the property of a family. The sample is classified by detecting whether it has the typical behavior of any family property. DroidFDR can capture the behavioral characteristics of malicious code such as control flow, data flow, procedure calls, and API calls. The experimental results show that the automated method can characterize the behavior patterns of applications from the structure level, with a high family classification accuracy of 99.06% in comparison with another formal detection method.
引用
收藏
页数:27
相关论文
共 49 条
[1]   Robust deep learning early alarm prediction model based on the behavioural smell for android malware [J].
Amer, Eslam ;
El-Sappagh, Shaker .
COMPUTERS & SECURITY, 2022, 116
[2]   CAAL: Concurrency Workbench, Aalborg Edition [J].
Andersen, Jesper R. ;
Andersen, Nicklas ;
Enevoldsen, Soren ;
Hansen, Mathias M. ;
Larsen, Kim G. ;
Olesen, Simon R. ;
Srba, Jiri ;
Wortmann, Jacob K. .
THEORETICAL ASPECTS OF COMPUTING - ICTAC 2015, 2015, 9399 :573-582
[3]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[4]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[5]   Mining Apps for Abnormal Usage of Sensitive Data [J].
Avdiienko, Vitalii ;
Kuznetsov, Konstantin ;
Gorla, Alessandra ;
Zeller, Andreas ;
Arzt, Steven ;
Rasthofer, Siegfried ;
Bodden, Eric .
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, :426-436
[6]   Towards Model Checking Android Applications [J].
Bai, Guangdong ;
Ye, Quanqi ;
Wu, Yongzheng ;
Botha, Heila ;
Sun, Jun ;
Liu, Yang ;
Dong, Jin Song ;
Visser, Willem .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (06) :595-612
[7]   Selective Mu-calculus and formula-based equivalence of transition systems [J].
Barbuti, R ;
De Francesco, N ;
Santone, A ;
Vaglini, G .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1999, 59 (03) :537-556
[8]  
Battista Pasquale, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P542
[9]   What the App is That? Deception and Countermeasures in the Android User Interface [J].
Bianchi, Antonio ;
Corbetta, Jacopo ;
Invernizzi, Luca ;
Fratantonio, Yanick ;
Kruegel, Christopher ;
Vigna, Giovanni .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :931-948
[10]   LEILA: Formal Tool for Identifying Mobile Malicious Behaviour [J].
Canfora, Gerardo ;
Martinelli, Fabio ;
Mercaldo, Francesco ;
Nardone, Vittoria ;
Santone, Antonella ;
Visaggio, Corrado Aaron .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (12) :1230-1252