to the demands. If the analyst wants to exactly lo-
cate the payload within the malware code or wishes a
high value of correctness in the family identification,
MC should be used. However, this approach requires
a greater computational time than ML. Instead, if the
analyst is interested in achieving a high correctness in
family identification, is not looking for the payload lo-
cation, and the efficiency has a priority higher than the
effectiveness, the choice should fall on the ML with f
4
feature. Finally, if the analyst wants to achieve a high
correctness in malware detection, the ML should be
employed, by using the f
1
, f
2
or f
3
features. Unfortu-
nately this will require a longer execution time.
6 CONCLUSIONS
Recognizing malware families (Zhou and Jiang,
2012) is a primary goal of malware analyst and sev-
eral approaches have been developed to face this is-
sue. In this work we have compared two static
approaches. The first one is a Machine Learning
based approach, differently the second one is a Model
Checking based approach. We have investigated
strengths and weaknesses of the two approaches. As
future work, we want to compare them with dynamic
techniques in order to have a clearer and wider pic-
ture.
REFERENCES
Alam, S., Riley, R., Sogukpinar, I., and Carkaci, N. (2016).
Droidclone: Detecting android malware variants by
exposing code clones. In 2016 Sixth International
Conference on Digital Information and Communica-
tion Technology and its Applications (DICTAP), pages
79–84.
Anastasi, G., Bartoli, A., De Francesco, N., and Santone, A.
(2001). Efficient verification of a multicast protocol
for mobile computing. Computer Journal, 44(1):21–
30. cited By 12.
Annachhatre, C., Austin, T. H., and Stamp, M. (2015).
Hidden markov models for malware classification.
J. Computer Virology and Hacking Techniques,
11(2):59–73.
Arp, D., Spreitzenbarth, M., Huebner, M., Gascon, H., and
Rieck, K. (2014). Drebin: Efficient and explainable
detection of android malware in your pocket. In Pro-
ceedings of 21th Annual Network and Distributed Sys-
tem Security Symposium (NDSS).
Battista, P., Mercaldo, F., Nardone, V., Santone, A., and
Visaggio, C. A. (2016). Identification of android mal-
ware families with model checking. In Proceedings of
the 2nd International Conference on Information Sys-
tems Security and Privacy - Volume 1: ICISSP,, pages
542–547.
Baysa, D., Low, R. M., and Stamp, M. (2013). Structural
entropy and metamorphic malware. Journal of Com-
puter Virology and Hacking Techniques, 9(4):179–
192.
Bose, A., Hu, X., Shin, K. G., and Park, T. (2008). Be-
havioral detection of malware on mobile handsets. In
Proceedings of the 6th International Conference on
Mobile Systems, Applications, and Services, MobiSys
’08, pages 225–238, New York, NY, USA. ACM.
Bruns, G. (1997). Distributed Systems Analysis with CCS.
Prentice-Hall.
Canfora, G., Lorenzo, A. D., Medvet, E., Mercaldo, F.,
and Visaggio, C. A. (2015). Effectiveness of opcode
ngrams for detection of multi family android malware.
In Proceedings of the 2015 10th International Confer-
ence on Availability, Reliability and Security, ARES
’15, pages 333–340, Washington, DC, USA. IEEE
Computer Society.
Canfora, G., Mercaldo, F., and Visaggio, C. A. (2016). An
hmm and structural entropy based detector for android
malware. Comput. Secur., 61(C):1–18.
Cleaveland, R. and Sims, S. (1996). The ncsu concurrency
workbench. In CAV. Springer.
De Francesco, N., Santone, A., and Tesei, L. (2003). Ab-
stract interpretation and model checking for checking
secure information flow in concurrent systems. Fun-
damenta Informaticae, 54(2-3):195–211. cited By 12.
De Ruvo, G., Nardone, V., Santone, A., Ceccarelli, M.,
and Cerulo, L. (2015). Infer gene regulatory networks
from time series data with probabilistic model check-
ing. pages 26–32. cited By 7.
Faruki, P., Laxmi, V., Bharmal, A., Gaur, M., and Ganmoor,
V. (2015). Androsimilar: Robust signature for detect-
ing variants of android malware. Journal of Informa-
tion Security and Applications, 22:66 – 80. Special
Issue on Security of Information and Networks.
Feng, Y., Anand, S., Dillig, I., and Aiken, A. Ap-
poscopy: Semantics-based detection of android mal-
ware through static analysis.
Mercaldo, F., Nardone, V., Santone, A., and Visaggio, C. A.
(2016a). Download malware? no, thanks: How for-
mal methods can block update attacks. In Proceedings
of the 4th FME Workshop on Formal Methods in Soft-
ware Engineering, FormaliSE ’16, pages 22–28, New
York, NY, USA. ACM.
Mercaldo, F., Nardone, V., Santone, A., and Visaggio,
C. A. (2016b). Hey malware, i can find you! In
2016 IEEE 25th International Conference on En-
abling Technologies: Infrastructure for Collaborative
Enterprises (WETICE), pages 261–262.
Mercaldo, F., Nardone, V., Santone, A., and Visaggio, C. A.
(2016c). Ransomware Steals Your Phone. Formal
Methods Rescue It, pages 212–221. Springer Inter-
national Publishing, Cham.
Milner, R. (1989). Communication and concurrency. PHI
Series in computer science. Prentice Hall.
Rabiner, L. R. (1989). A tutorial on hidden markov models
and selected applications in speech recognition. Pro-
ceedings of the IEEE, 77(2):257–286.
Santone, A. (2011). Clone detection through process alge-
bras and java bytecode. pages 73–74. cited By 10.
“Mirror, Mirror on the Wall, Who is the Fairest One of All?” - Machine Learning versus Model Checking: A Comparison between Two
Static Techniques for Malware Family Identification
671