Results in Table 4 seems to be very promising: we
obtain an Accuracy equal to 0.9. Concerning the Gin-
Master results, we are not able to identify the mali-
cious payloads of just 2 samples on 100. It is worth
noting the above values are also due to the fact that the
dataset is unbalanced, i.e., 100 malware belonging to
GinMaster family and 761.
5 CONCLUSION AND FUTURE
WORK
The most common way to inject malicious payload
in Android environment is represented by the repack-
aging attack, that basically consists to distribute le-
gitimate well-known applications with the malicious
behaviour in order to lure users. In this paper we
propose an approach, based on formal methods, able
to catch the malicious payload related to GinMaster
family, one of the most populous repackaged trojan
embed in legitimate Android applications. GinMaster
family is able to root Android devices in order to ex-
ecute shell scripts with admin privileges, in addition
it is able to send personal user information to the at-
tacker using C&C server. We identified a set of rules
specific to GinMaster payload behaviour and we eval-
uate the effectiveness of our approach using a dataset
of real-world malware, obtaining an accuracy equal to
0.9. As future work, we plan to test our approach on
mobile malware belonging to other families that ex-
hibit trojan behaviour to evaluate the rule set on fam-
ilies with similar payload.
ACKNOWLEDGEMENTS
This work has been partially supported by H2020
EU-funded projects NeCS and C3ISP and EIT-Digital
Project HII.
REFERENCES
Andersen, J. R., Andersen, N., Enevoldsen, S., Hansen,
M. M., Larsen, K. G., Olesen, S. R., Srba, J., and
Wortmann, J. K. (2015). CAAL: concurrency work-
bench, aalborg edition. In Theoretical Aspects of
Computing - ICTAC 2015 - 12th International Col-
loquium Cali, Colombia, October 29-31, 2015, Pro-
ceedings, pages 573–582.
Arp, D., Spreitzenbarth, M., Huebner, M., Gascon, H., and
Rieck, K. (2014). Drebin: Efficient and explainable
detection of android malware in your pocket. In Pro-
ceedings of 21th Annual Network and Distributed Sys-
tem Security Symposium (NDSS). IEEE.
Barbuti, R., De Francesco, N., Santone, A., and Tesei,
L. (2002). A notion of non-interference for timed
automata. Fundamenta Informaticae, 51(1-2):1–11.
cited By 6.
Barbuti, R., Francesco, N. D., Santone, A., and Vaglini, G.
(2005). Reduced models for efficient CCS verifica-
tion. Formal Methods in System Design, 26(3):319–
350.
Battista, P., Mercaldo, F., Nardone, V., Santone, A., and Vis-
aggio, C. A. (2016). Identification of android malware
families with model checking. In International Con-
ference on Information Systems Security and Privacy.
SCITEPRESS.
Bernardeschi, C., De Francesco, N., Lettieri, G., and Mar-
tini, L. (2004). Checking secure information flow in
java bytecode by code transformation and standard
bytecode verification. Software - Practice and Expe-
rience, 34(13):1225–1255.
Canfora, G., Mercaldo, F., and Visaggio, C. A. (2016). An
hmm and structural entropy based detector for android
malware: An empirical study. Computers & Security,
61:1–18.
Cleaveland, R. and Sims, S. (1996). The ncsu concurrency
workbench. In CAV. Springer.
De Ruvo, G., Nardone, V., Santone, A., Ceccarelli, M.,
and Cerulo, L. (2015). Infer gene regulatory networks
from time series data with probabilistic model check-
ing. pages 26–32. cited By 7.
Fedler, R., Sch
¨
utte, J., and Kulicke, M. (2014). On
the effectiveness of malware protection on an-
droid: An evaluation of android antivirus apps,
http://www.aisec.fraunhofer.de/.
Garavel, H., Lang, F., Mateescu, R., and Serwe, W. (2013).
CADP 2011: a toolbox for the construction and anal-
ysis of distributed processes. STTT, 15(2):89–107.
GoogleMobile (2014). http://googlemobile.blogspot.it/2012/
02/android-and-security.html.
Isohara, T., Takemori, K., and Kubota, A. (2011). Kernel-
based behavior analysis for android malware detec-
tion. In Proceedings of Seventh International Confer-
ence on Computational Intelligence and Security, pp.
1011-1015.
Jacob, G., Filiol, E., and Debar, H. (2010). Formalization of
viruses and malware through process algebras. In In-
ternational Conference on Availability, Reliability and
Security (ARES 2010). IEEE.
Kinder, J., Katzenbeisser, S., Schallhart, C., and Veith, H.
(2005). Detecting malicious code by model checking.
Springer.
Liang, S. and Du, X. (2014). Permission-combination-
based scheme for android mobile malware detec-
tion. In International Conference on Communica-
tions, pages 2301–2306.
Marforio, C., Aurelien, F., and Srdjan, C. (2011).
Application collusion attack on the permission-
based security model and its implications for mod-
ern smartphone systems, ftp://ftp.inf.ethz.ch/doc/tech-
reports/7xx/724.pdf.
Mercaldo, F., Nardone, V., Santone, A., and Visaggio, C. A.
(2016a). Download malware? No, thanks. How for-
mal methods can block update attacks. In Formal
Identifying Mobile Repackaged Applications through Formal Methods
681