6 CONCLUDING REMARKS AND
FUTURE WORK
Since previous works in mobile malware detection fo-
cus on the research in discriminating a malware appli-
cation from a trusted one, in this paper we propose an
approach to localize the malicious behaviour at a finer
grain, i.e., at payload level.
We use model checking in order to test our model
against two of most diffused malware family in An-
droid environment: the DroidKungFu and the Opfake
families. We test in addition the robustness of our
solution generating morphed malware and testing it
using the model. Results seem to be promising: we
identify malicious payloads with a very high accuracy
value and with a reasonable time. This implies that
our methodology is efficient and scalable.
As future work we are going to extend our prelimi-
nary evaluation to other widespread families. Further-
more, we plan to track the phylogenesis of malware to
characterize the payload family tree and to foresee the
possible payload evolution.
ACKNOWLEDGEMENTS
The Authors thank Domenico Martino for helping in
the implementation of the prototype tool used to test
the methodology.
REFERENCES
Arp, D., Spreitzenbarth, M., Huebner, M., Gascon, H., and
Rieck, K. (2014). Drebin: Efficient and explainable
detection of android malware in your pocket. In Pro-
ceedings of 21th Annual Network and Distributed Sys-
tem Security Symposium (NDSS). IEEE.
Bailey, U., Comparetti, P., Hlauschek, C., Kruegel, C., and
Kirda, E. (2009). Scalable, behavior-based malware
clustering. In Network and Distributed System Secu-
rity Symposium. IEEE.
Barbuti, R., Francesco, N. D., Santone, A., and Vaglini,
G. (1999). Selective mu-calculus and formula-based
equivalence of transition systems. Elsevier.
Canfora, G., Di Sorbo, A., Mercaldo, F., and Visaggio,
C. (2015). Obfuscation techniques against signature-
based detection: a case study. In Proceedings of Work-
shop on Mobile System Technologies. IEEE.
Canfora, G., Mercaldo, F., and Visaggio, C. A. (2013). A
classifier of malicious android applications. In Pro-
ceedings of the 2nd International Workshop on Secu-
rity of Mobile Applications, in conjunction with the In-
ternational Conference on Availability, Reliability and
Security. IEEE.
Clarke, E. M., Grumberg, O., and Peled, D. (2001). Model
checking. MIT Press.
Cleaveland, R. and Sims, S. (1996). The ncsu concurrency
workbench. In Alur, R. and Henzinger, T. A., editors,
CAV, volume 1102 of Lecture Notes in Computer Sci-
ence. Springer.
Dumitras, T. and Neamtiu, I. (2011). Experimental chal-
lenges in cyber security: A story of provenance and
lineage for malware. ACM.
Hu, X., Chiueh, T., Shin, K., Kruegel, C., and Kirda, E.
(2009). Large-scale malware indexing using function
call graphs. In ACM Conference on Computer and
Communications Security. ACM.
Jacob, G., Filiol, E., and Debar, H. (2010). Formalization of
viruses and malware through process algebras. In In-
ternational Conference on Availability, Reliability and
Security (ARES 2010). IEEE.
Jang, J., Brumley, D., and Venkataraman, S. (2011). Bit-
shred: feature hashing malware for scalable triage and
semantic analysis. In ACM Conference on Computer
and Communications Security. ACM.
Karim, M. E., Walenstein, A., Lakhotia, A., and Parida, L.
(2005). Malware phylogeny generation using permu-
tations of code. Springer.
Khoo, W. and Lio, P. (2011). Unity in diversity:
Phylogenetic-inspired techniques for reverse engi-
neering and detection of malware families. In SysSec
Workshop. Springer.
Kinder, J., Katzenbeisser, S., Schallhart, C., and Veith, H.
(2005). Detecting malicious code by model checking.
Springer.
Ma, J., Dunagan, J., Wang, H. J., Savage, S., and Voelker,
G. M. (2006). Finding diversity in remote code in-
jection exploits. In Proceedings of the 6th ACM SIG-
COMM conference on Internet measurement. ACM.
Milner, R. (1989). Communication and concurrency. PHI
Series in computer science. Prentice Hall.
Santone, A. and Vaglini, G. Abstract reduction in directed
model checking CCS processes. Springer.
Song, F. and Touili, T. (2001). Efficient malware detection
using model-checking. Springer.
Song, F. and Touili, T. (2013). Pommade: Pushdown
model-checking for malware detection. In Proceed-
ings of the 2013 9th Joint Meeting on Foundations of
Software Engineering. ACM.
Song, F. and Touili, T. (2014). Model-checking for android
malware detection. Springer.
Spreitzenbarth, M., Echtler, F., Schreck, T., Freling, F. C.,
and Hoffmann, J. (2013). Mobilesandbox: Looking
deeper into android applications. In 28th International
ACM Symposium on Applied Computing (SAC). ACM.
Stirling, C. (1989). An introduction to modal and temporal
logics for ccs. In Yonezawa, A. and Ito, T., editors,
Concurrency: Theory, Language, And Architecture,
LNCS, pages 2–20. Springer.
Zhou, Y. and Jiang, X. (2012). Dissecting android mal-
ware: Characterization and evolution. In Proceed-
ings of 33rd IEEE Symposium on Security and Privacy
(Oakland 2012). IEEE.
Identification of Android Malware Families with Model Checking
547