8 CONCLUSIONS
Android is the most widespread mobile operating sy-
stem. Malware writers threaten it using new types of
attacks. One of the last new threats is the collusion
attack. During this kind of attack the malicious be-
haviour is performed through multiple applications:
two or more applications collaborate in order to ac-
complish malicious aims. In collusion attacks the ap-
plications intentionally put in view some private data.
This paper aims to investigate whether legitimate and
malware applications show public user data. This is a
kind of vulnerability detected by the methodology de-
signed in this work using a dataset composed by 200
legitimate applications downloaded from the Android
official store and 200 malware samples belonging to
the Drebin dataset. The results show that some legi-
timate applications intentionally expose public data.
Instead, Opfake and Plankton malware samples lar-
gely expose the public Shared Preferences vulnerabi-
lity.
ACKNOWLEDGEMENTS
This work has been partially supported by H2020
EU-funded projects NeCS and C3ISP and EIT-Digital
Project HII.
REFERENCES
Anastasi, G., Bartoli, A., De Francesco, N., and Santone, A.
(2001). Efficient verification of a multicast protocol
for mobile computing. Computer Journal, 44(1):21–
30. cited By 12.
Arp, D., Spreitzenbarth, M., Huebner, M., Gascon, H., and
Rieck, K. (2014). Drebin: Efficient and explainable
detection of android malware in your pocket. In Pro-
ceedings of 21th Annual Network and Distributed Sy-
stem Security Symposium (NDSS).
Asavoae, I. M., Blasco, J., Chen, T. M., Kalutarage, H. K.,
Muttik, I., Nguyen, H. N., Roggenbach, M., and
Shaikh, S. A. (2016). Towards automated android app
collusion detection. arXiv preprint arXiv:1603.02308.
Bagheri, H., Sadeghi, A., Garcia, J., and Malek, S. (2015).
Covert: Compositional analysis of android inter-app
permission leakage. IEEE Transactions on Software
Engineering, 41:866–886.
Battista, P., Mercaldo, F., Nardone, V., Santone, A., and
Visaggio, C. A. (2016). Identification of android mal-
ware families with model checking. In Proceedings of
the 2nd International Conference on Information Sys-
tems Security and Privacy - Volume 1: ICISSP,, pages
542–547.
Bhandari, S., Herbreteau, F., Laxmi, V., Zemmari, A.,
Roop, P. S., and Gaur, M. S. (2017). Poster: Detecting
inter-app information leakage paths. In Proceedings of
the 2017 ACM on Asia Conference on Computer and
Communications Security, pages 908–910. ACM.
Bruns, G. (1997). Distributed Systems Analysis with CCS.
Prentice-Hall.
Cleaveland, R. and Sims, S. (1996). The ncsu concurrency
workbench. In CAV. Springer.
De Francesco, N., Santone, A., and Tesei, L. (2003). Ab-
stract interpretation and model checking for checking
secure information flow in concurrent systems. Fun-
damenta Informaticae, 54(2-3):195–211. cited By 12.
De Ruvo, G., Nardone, V., Santone, A., Ceccarelli, M.,
and Cerulo, L. (2015). Infer gene regulatory net-
works from time series data with probabilistic model
checking. pages 26–32. cited By 7.
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G.,
Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N.
(2014). Taintdroid: an information-flow tracking sy-
stem for realtime privacy monitoring on smartphones.
ACM Transactions on Computer Systems (TOCS),
32(2):5.
Filiol, E. i irolla, p.(2015).(in) security of mobile banking...
and of other mobile apps*.
Li, L., Bartel, A., Bissyand
´
e, T. F., Klein, J., and Le Traon,
Y. (2015a). Apkcombiner: Combining multiple an-
droid apps to support inter-app analysis. In IFIP Inter-
national Information Security Conference, pages 513–
527. Springer.
Li, L., Bartel, A., Bissyand
´
e, T. F., Klein, J., Le Traon,
Y., Arzt, S., Rasthofer, S., Bodden, E., Octeau, D.,
and McDaniel, P. (2015b). Iccta: Detecting inter-
component privacy leaks in android apps. In Procee-
dings of the 37th International Conference on Soft-
ware Engineering - Volume 1, ICSE ’15, pages 280–
291, Piscataway, NJ, USA. IEEE Press.
Li, L., Bartel, A., Klein, J., and Le Traon, Y. (2014). Auto-
matically exploiting potential component leaks in an-
droid applications. In 2014 IEEE 13th International
Conference on Trust, Security and Privacy in Compu-
ting and Communications, pages 388–397. IEEE.
Liu, F., Cai, H., Wang, G., Yao, D. D., Elish, K. O., and
Ryder, B. G. (2017). Mr-droid: A scalable and priori-
tized analysis of inter-app communication risks. Proc.
of MoST.
Mercaldo, F., Nardone, V., Santone, A., and Visaggio, C. A.
(2016). Download malware? no, thanks: How formal
methods can block update attacks. In Proceedings of
the 4th FME Workshop on Formal Methods in Soft-
ware Engineering, FormaliSE ’16, pages 22–28, New
York, NY, USA. ACM.
Milner, R. (1989). Communication and concurrency. PHI
Series in computer science. Prentice Hall.
Santone, A. (2011). Clone detection through process alge-
bras and java bytecode. pages 73–74. cited By 10.
Spreitzenbarth, M., Echtler, F., Schreck, T., Freling, F. C.,
and Hoffmann, J. (2013). Mobilesandbox: Looking
deeper into android applications. In 28th International
ACM Symposium on Applied Computing (SAC).