DroidFDR: Automatic Classification of Android Malware Using Model Checking

被引:2
作者
Yang, Zhi [1 ,2 ]
Chao, Fan [1 ,2 ]
Chen, Xingyuan [1 ,2 ,3 ]
Jin, Shuyuan [4 ]
Sun, Lei [1 ,2 ]
Du, Xuehui [1 ,2 ]
机构
[1] PLA Informat Engn Univ, Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450001, Peoples R China
[2] Informat Engn Univ, Henan Prov Key Lab Informat Secur, Zhengzhou 450001, Peoples R China
[3] State Key Lab Cryptol, Beijing 100084, Peoples R China
[4] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Android; malware detection; communicating sequential processes; formal method; model checking;
D O I
10.3390/electronics11111798
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android faces an increasing threat of malware attacks. The few existing formal detection methods have drawbacks such as complex code modeling, incomplete and inaccurate expression of family properties, and excessive manual participation. To this end, this paper proposes a formal detection method, called DroidFDR, for Android malware classification based on communicating sequential processes (CSP). In this method, the APK file of an application is converted to an easy-to-analyze representation, namely Jimple, in order to model the code behavior with CSP. The process describing the behavior of a sample is inputted to an FDR model checker to be simplified and verified against a process that is automatically abstracted from the malware to express the property of a family. The sample is classified by detecting whether it has the typical behavior of any family property. DroidFDR can capture the behavioral characteristics of malicious code such as control flow, data flow, procedure calls, and API calls. The experimental results show that the automated method can characterize the behavior patterns of applications from the structure level, with a high family classification accuracy of 99.06% in comparison with another formal detection method.
引用
收藏
页数:27
相关论文
共 49 条
[21]   Open Source Intelligence for Malicious Behavior Discovery and Interpretation [J].
Huang, Yi-Ting ;
Lin, Chi Yu ;
Guo, Ying-Ren ;
Lo, Kai-Chieh ;
Sun, Yeali S. ;
Chen, Meng Chang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) :776-789
[22]   Android-SEM: Generative Adversarial Network for Android Malware Semantic Enhancement Model Based on Transfer Learning [J].
Huang, Yizhao ;
Li, Xingwei ;
Qiao, Meng ;
Tang, Ke ;
Zhang, Chunyan ;
Gui, Hairen ;
Wang, Panjie ;
Liu, Fudong .
ELECTRONICS, 2022, 11 (05)
[23]   Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection [J].
Iadarola, Giacomo ;
Martinelli, Fabio ;
Mercaldo, Francesco ;
Santone, Antonella .
APPLIED SCIENCES-BASEL, 2020, 10 (22) :1-20
[24]   A Multi-Modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store [J].
Karunanayake, Naveen ;
Rajasegaran, Jathushan ;
Gunathillake, Ashanie ;
Seneviratne, Suranga ;
Jourjon, Guillaume .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (01) :16-30
[25]   IccTA: Detecting Inter-Component Privacy Leaks in Android Apps [J].
Li, Li ;
Bartel, Alexandre ;
Bissyande, Tegawende F. ;
Klein, Jacques ;
Le Traon, Yves ;
Arzt, Steven ;
Rasthofer, Siegfried ;
Bodden, Eric ;
Octeau, Damien ;
McDaniel, Patrick .
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, :280-291
[26]   Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation [J].
Martinelli, Fabio ;
Mercaldo, Francesco ;
Nardone, Vittoria ;
Santone, Antonella ;
Vaglini, Gigliola .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 105
[27]   Deep Android Malware Detection [J].
McLaughlin, Niall ;
del Rincon, Jesus Martinez ;
Kang, BooJoong ;
Yerima, Suleiman ;
Miller, Paul ;
Sezer, Sakir ;
Safaei, Yeganeh ;
Trickel, Erik ;
Zhao, Ziming ;
Doup, Adam ;
Ahn, Gail Joon .
PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, :301-308
[28]  
Mercaldo F, 2016, FME WORKS FORM, P22, DOI [10.1109/FormaliSE.2016.012, 10.1145/2897667.2897673]
[29]   Ransomware Steals Your Phone. Formal Methods Rescue It [J].
Mercaldo, Francesco ;
Nardone, Vittoria ;
Santone, Antonella ;
Visaggio, Corrado Aaron .
FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS (FORTE 2016), 2016, 9688 :212-221
[30]  
Milner R., 1989, Communication and concurrency