4.6 Article

LEILA: Formal Tool for Identifying Mobile Malicious Behaviour

期刊

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
卷 45, 期 12, 页码 1230-1252

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TSE.2018.2834344

关键词

Malware; Androids; Humanoid robots; Payloads; Computer security; Model checking; Automata; Security; malware; model checking; testing; Android

资金

  1. H2020 EU funded project NeCS [675320]
  2. H2020 EU funded project C3ISP [700294]

向作者/读者索取更多资源

With the increasing diffusion of mobile technologies, nowadays mobile devices represent an irreplaceable tool to perform several operations, from posting a status on a social network to transfer money between bank accounts. As a consequence, mobile devices store a huge amount of private and sensitive information and this is the reason why attackers are developing very sophisticated techniques to extort data and money from our devices. This paper presents the design and the implementation of LEILA (formaL tool for idEntifying mobIle maLicious behAviour), a tool targeted at Android malware families detection. LEILA is based on a novel approach that exploits model checking to analyse and verify the Java Bytecode that is produced when the source code is compiled. After a thorough description of the method used for Android malware families detection, we report the experiments we have conducted using LEILA. The experiments demonstrated that the tool is effective in detecting malicious behaviour and, especially, in localizing the payload within the code: we evaluated real-world malware belonging to several widespread families obtaining an accuracy ranging between 0.97 and 1.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据