Call Graph and Model Checking for Fine-Grained Android Malicious Behaviour Detection

被引:10
作者
Iadarola, Giacomo [1 ]
Martinelli, Fabio [1 ]
Mercaldo, Francesco [1 ,2 ]
Santone, Antonella [2 ]
机构
[1] Natl Res Council Italy, Inst Informat & Telemat, I-56124 Pisa, Italy
[2] Univ Molise, Dept Med & Hlth Sci Vincenzo Tiberio, I-86100 Campobasso, Italy
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 22期
关键词
malware; model checking; formal methods; security; Android; mobile;
D O I
10.3390/app10227975
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The increasing diffusion of mobile devices, widely used for critical tasks such as the transmission of sensitive and private information, corresponds to an increasing need for methods to detect malicious actions that can undermine our data. As demonstrated in the literature, the signature-based approach provided by antimalware is not able to defend users from new threats. In this paper, we propose an approach based on the adoption of model checking to detect malicious families in the Android environment. We consider two different automata representing Android applications, based respectively on Control Flow Graphs and Call Graphs. The adopted graph data structure allows to detect potentially malicious behaviour and also localize the code where the malicious action happens. We experiment the effectiveness of the proposed method evaluating more than 3000 real-world Android samples (with 2552 malware belonging to 21 malicious family), by reaching an accuracy ranging from 0.97 to 1 in malicious family detection.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 38 条
[21]  
Gabbay D., 1994, TEMPORAL LOGIC MATH, V1
[22]  
Gautam A., 2020, Int J Oper Res Inf Syst, V11, P19, DOI [10.4018/IJORIS.2020070102, DOI 10.4018/IJORIS.2020070102]
[23]   Formal Methods for Android Banking Malware Analysis and Detection [J].
Iadarola, Giacomo ;
Martinelli, Fabio ;
Mercaldo, Francesco ;
Santone, Antonella .
2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, :331-336
[24]  
Jasiul B., 2015, Computer Science and its Applications, V330, P475
[25]  
Kevin Hoang, 2020, Cognitive Computing - ICCC 2020. 4th International Conference Held as Part of the Services Conference Federation, SCF 2020. Proceedings. Lecture Notes in Computer Science (LNCS 12408), P88, DOI 10.1007/978-3-030-59585-2_8
[26]   Malware classification based on call graph clustering [J].
Kinable, Joris ;
Kostakis, Orestis .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04) :233-245
[27]   Stuxnet: Dissecting a Cyberwarfare Weapon [J].
Langner, Ralph .
IEEE SECURITY & PRIVACY, 2011, 9 (03) :49-51
[28]  
LaToza TD, 2011, S VIS LANG HUM CEN C, P117, DOI 10.1109/VLHCC.2011.6070388
[29]   Attack Detection for Healthcare Monitoring Systems Using Mechanical Learning in Virtual Private Networks over Optical Transport Layer Architecture [J].
Liagkou, Vasiliki ;
Kavvadas, Vasileios ;
Chronopoulos, Spyridon K. ;
Tafiadis, Dionysios ;
Christofilakis, Vasilis ;
Peppas, Kostas P. .
COMPUTATION, 2019, 7 (02)
[30]   Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation [J].
Martinelli, Fabio ;
Mercaldo, Francesco ;
Nardone, Vittoria ;
Santone, Antonella ;
Vaglini, Gigliola .
SIMULATION MODELLING PRACTICE AND THEORY, 2020, 105