With the increasing diffusion of mobile technologies, nowadays mobile devices represent an irreplaceable tool to perform several operations, from posting a status on a social network to transfer money between bank accounts. As a consequence, mobile devices store a huge amount of private and sensitive information and this is the reason why attackers are developing very sophisticated techniques to extort data and money from our devices. This paper presents the design and the implementation of LEILA (formaL tool for idEntifying mobIle maLicious behAviour), a tool targeted at Android malware families detection. LEILA is based on a novel approach that exploits model checking to analyse and verify the Java Bytecode that is produced when the source code is compiled. After a thorough description of the method used for Android malware families detection, we report the experiments we have conducted using LEILA. The experiments demonstrated that the tool is effective in detecting malicious behaviour and, especially, in localizing the payload within the code: we evaluated real-world malware belonging to several widespread families obtaining an accuracy ranging between 0.97 and 1.
|Digital Object Identifier (DOI):||http://dx.doi.org/10.1109/TSE.2018.2834344|
|Codice identificativo ISI:||WOS:000502756700004|
|Codice identificativo Scopus:||2-s2.0-85046823329|
|Titolo:||LEILA: formaL tool for idEntifying mobIle maLicious behAviour|
|Appare nelle tipologie:||1.1 Articolo in rivista|