skip to main content
10.1145/3052973.3055157acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
demonstration

How Discover a Malware using Model Checking

Published:02 April 2017Publication History

ABSTRACT

Android operating system is constantly overwhelmed by new sophisticated threats and new zero-day attacks. While aggressive malware, for instance malicious behaviors able to cipher data files or lock the GUI, are not worried to circumvention users by infection (that can try to disinfect the device), there exist malware with the aim to perform malicious actions stealthy, i.e., trying to not manifest their presence to the users. This kind of malware is less recognizable, because users are not aware of their presence. In this paper we propose FormalDroid, a tool able to detect silent malicious beaviours and to localize the malicious payload in Android application. Evaluating real-world malware samples we obtain an accuracy equal to 0.94.

References

  1. F. Mercaldo, V. Nardone, A. Santone, and C. A. Visaggio, "Ransomware steals your phone. formal methods rescue it," in International Conference on Formal Techniques for Distributed Objects, Components, and Systems, pp. 212--221, Springer, 2016.Google ScholarGoogle Scholar
  2. V. Rastogi, Y. Chen, and X. Jiang, "Droidchameleon: evaluating android anti-malware against transformation attacks," in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pp. 329--334, ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Milner, Communication and concurrency. PHI Series in computer science, Prentice Hall, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Stirling, "An introduction to modal and temporal logics for ccs," in Concurrency: Theory, Language, And Architecture (A. Yonezawa and T. Ito, eds.), LNCS, pp. 2--20, Springer, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Cleaveland and S. Sims, "The ncsu concurrency workbench," in CAV (R. Alur and T. A. Henzinger, eds.), vol. 1102 of Lecture Notes in Computer Science, Springer, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Deshotels, V. Notani, and A. Lakhotia, "Droidlegacy: Automated familial classification of android malware," in Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014, PPREW'14, (New York, NY, USA), pp. 3:1--3:12, ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and J. Blasco, "Dendroid: A text mining approach to analyzing and classifying code structures in android malware families," Expert Syst. Appl., vol. 41, pp. 1104--1117, Mar. 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Y. Feng, S. Anand, I. Dillig, and A. Aiken, "Apposcopy: Semantics-based detection of android malware through static analysis."Google ScholarGoogle Scholar
  9. G. Canfora, F. Mercaldo, and C. A. Visaggio, "An hmm and structural entropy based detector for android malware," Comput. Secur., vol. 61, pp. 1--18, Aug. 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Alam, R. Riley, I. Sogukpinar, and N. Carkaci, "Droidclone: Detecting android malware variants by exposing code clones," in 2016 Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), pp. 79--84, July 2016.Google ScholarGoogle Scholar
  11. D. Arp, M. Spreitzenbarth, M. Huebner, H. Gascon, and K. Rieck, "Drebin: Efficient and explainable detection of android malware in your pocket," in Proceedings of 21th NDSS, IEEE, 2014.Google ScholarGoogle Scholar
  12. M. Zheng, P. P. Lee, and J. C. Lui, "Adam: an automatic and extensible platform to stress test android anti-virus systems," in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 82--101, Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. How Discover a Malware using Model Checking

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
      April 2017
      952 pages
      ISBN:9781450349444
      DOI:10.1145/3052973

      Copyright © 2017 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 April 2017

      Check for updates

      Qualifiers

      • demonstration

      Acceptance Rates

      ASIA CCS '17 Paper Acceptance Rate67of359submissions,19%Overall Acceptance Rate418of2,322submissions,18%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader