Malicious Collusion Detection in Mobile Environment by means of Model Checking

Author(s):  
Rosangela Casolare ◽  
Fabio Martinelli ◽  
Francesco Mercaldo ◽  
Antonella Santone
2020 ◽  
Vol 10 (23) ◽  
pp. 8351
Author(s):  
Rosangela Casolare ◽  
Fabio Martinelli ◽  
Francesco Mercaldo ◽  
Antonella Santone

The increase in computing capabilities of mobile devices has, in the last few years, made possible a plethora of complex operations performed from smartphones and tablets end users, for instance, from a bank transfer to the full management of home automation. Clearly, in this context, the detection of malicious applications is a critical and challenging task, especially considering that the user is often totally unaware of the behavior of the applications installed on their device. In this paper, we propose a method to detect inter-app communication i.e., a colluding communication between different applications with data support to silently exfiltrate sensitive and private information. We based the proposed method on model checking, by representing Android applications in terms of automata and by proposing a set of logic properties to reduce the number of comparisons and a set of logic properties automatically generated for detecting colluding applications. We evaluated the proposed method on a set of 1092 Android applications, including different colluding attacks, by obtaining an accuracy of 1, showing the effectiveness of the proposed method.


2020 ◽  
Vol 90 ◽  
pp. 101691 ◽  
Author(s):  
Mario G.C.A. Cimino ◽  
Nicoletta De Francesco ◽  
Francesco Mercaldo ◽  
Antonella Santone ◽  
Gigliola Vaglini

Author(s):  
James Kapinski ◽  
Alexandre Donze ◽  
Flavio Lerda ◽  
Hitashyam Maka ◽  
Edmund Clarke ◽  
...  

2019 ◽  
Vol 13 (3) ◽  
pp. 1
Author(s):  
ALIYU E. O. ◽  
ADEWALE O. S. ◽  
ADETUNMBI A. O. ◽  
OJOKOH B. A. ◽  
◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document